-
@ 06639a38:655f8f71
2024-10-18 09:28:58- Worked on the https://nostr-php.dev docs
- Discussed a FOSDEM stand application with Jurjen and Tanja to attend that conference with Nostr
- Release version
1.4.2
of Nostr-PHP - Pre-release
2.0.0-alpha1
-
@ 06639a38:655f8f71
2024-10-18 08:12:43Week 40
- Added a page with my research findings around async concurrent websocket requests: https://nostr-php.dev/references/async-concurrent-requests
Week 41
I attended the Nostrdam meetup and helped as a volunteer at the Nostr booth at the Bitcoin Amsterdam 2024 conference. Here are some photo's:
I also wrote down my personal learned lessons from this expierence: https://nostrver.se/note/my-learned-nostr-lessons-nostr-booth-bitcoin-amsterdam-2024
-
@ aedd8f68:296cf1be
2024-10-17 21:21:42Note: This is not some fancy writing piece. this is just brain farting that I thought it was too long for a regular post.
Alex Gleason is always doing a lot of crazy interesting work. Ditto is a step in the right direction for an alternate type of relay ecosystem that runs alongside the standard globally focused community we all know.
While #Ditto is awesome, what I'd really like to see something similar, but more focused on a multi-community experience that simultaneously makes each community's viewing experience focused only on that community's content. Just for fun, to write down some ideas, below are the 2 big changes that I think would make ditto the ultimate "communities" system that could trounce Reddit.
1. Single relay experience on the domain:
By default, I think community sites should only show content from the built in relay (or a relay group for redundancy). Currently on ditto.pub, when you first sign in, it feels a lot like any other web nostr client. The default home just shows follows I have from other relays instead of being thrown into the community content. You have to click the local feed, to filter the community's content, but it's limited to people who registered a NIP-05 for that domain. I think that it would be great if you could contribute with any NIP-05 and it counts as community content. That could be accomplished by equate community content to content posted on the relay. There are countless apps to get a feed of your relays, so it doesn't benefit me to see it on a communty's domain.
2. Sister client giving multi-community aggregation experience:
I think communities should like pokemon and you grab the ones to identify with. Create a set of web and mobile app clients that manage viewing and switching single relays at a time. The client experience would be like reddit where you navigate ditto communities like subreddits. If a community is a pokemon, then this is the pokedex? OK I actually don't know shit about pokemon so that might not be the slam dunk I thought it was. Whoops.
Ideas / more particulars
- To see a community's content, you add a community relay subscribing to subreddit, or simply visit the domain.
- Another great feature would be customizing the relays that make up your home feed, and making other named combo-feeds (especially awesome if you are a part of 2 rival communities who's focus generally overlap)
- The client would use more globally used relays to handle settings like your list followed ditto communities, etc (configurable)
- Similarly, to help users find communities, ditto servers can optionally publish their relay info to a list on a "discovery" relay. Main popular discovery relays would be set by default (where communities publish discovery info to), but could be configured to other relays (if people wanted to set up custom curation relays or something.)
- Registering a domain handle (NIP-05) at the community domain can be more focused on people with relay moderation roles, or just people who really for some reason want that community to be their whole identity (i don't personally get that, which is why mastodon is not for me)
- Communities could work independently of the aggregator app(s) If people just wanted to visit the domain to post (from any NIP-05)
-
@ 599f67f7:21fb3ea9
2024-10-17 15:35:19Nostr proxy baten erabilera modu oso eraginkorra da internet banda-zabaleraren eta mugikorretan bateriaren kontsumoa optimizatzeko.
Proxy batek hainbat errelei-konexio konexio bakarrean biltzen dituenez, baliabideen erabilera nabarmen murrizten du, eta erabiltzailearen IP helbidea ezkutatuz pribatutasun-geruza bat gehitzen du.
Hona hemen nola funtzionatzen duen eta nola konfigura daitekeen:
Nola funtzionatzen du?
Nostr proxy batek hainbat erreleirekin konektatzen du. Errele horietara gertaerak eskuratu eta argitaratzen ditu. Bezeroaren aplikazioak WebSocket konexio bakarra ireki behar du proxy-ra, eta horren bidez proxy-ak konektatuta dituen errele guztiak eskuragarri izango ditu.
Irudiaren egiletza: Yonle 2023
Bezeroak konexio bakarra irekitzen duenez, datuak eta bateria aurrezten ditu.
Proxy-ak bezeroaren izenean erreleekin konektatzen denez, erreleek proxy-aren IP helbidea ikusten dute, eta ez bezeroarena. (Hala ere, proxy hornitzailearengan konfiantza izan behar duzu).
Erabiltzeko Modua
Nostr proxy bat erraz auto-ostata daiteke. Auto-ostatatzeko jarraibideak lortzeko, begiratu nostr:npub1x3azxuysp5vmfer4vgs4jn5tmfcx4ew8sh0qnev7gczljxsr7jwqa3g4el erabiltzailearen biltegi hau.
Auto-ostatzeko baliabiderik ez dutenentzat, Bitcoin Txoko-k komunitate-instantzia bat ostalaratzen du.
Erabiltzeko, gehitu besterik ez duzu:
wss://bostr.bitcointxoko.com
zure errele zerrendara.
Orain ez duzunez zuzeneko konexioak behar, errele bikoiztuak ezabatu ditzakezu.
Ikusiko dugu elkar Nostr-en!
-
@ 8cb60e21:5f2deaea
2024-09-10 21:14:08 -
@ 4ba8e86d:89d32de4
2024-10-07 13:37:38O que é Cwtch? Cwtch (/kʊtʃ/ - uma palavra galesa que pode ser traduzida aproximadamente como “um abraço que cria um lugar seguro”) é um protocolo de mensagens multipartidário descentralizado, que preserva a privacidade, que pode ser usado para construir aplicativos resistentes a metadados.
Como posso pronunciar Cwtch? Como "kutch", para rimar com "butch".
Descentralizado e Aberto : Não existe “serviço Cwtch” ou “rede Cwtch”. Os participantes do Cwtch podem hospedar seus próprios espaços seguros ou emprestar sua infraestrutura para outras pessoas que buscam um espaço seguro. O protocolo Cwtch é aberto e qualquer pessoa é livre para criar bots, serviços e interfaces de usuário e integrar e interagir com o Cwtch.
Preservação de privacidade : toda a comunicação no Cwtch é criptografada de ponta a ponta e ocorre nos serviços cebola Tor v3.
Resistente a metadados : O Cwtch foi projetado de forma que nenhuma informação seja trocada ou disponibilizada a ninguém sem seu consentimento explícito, incluindo mensagens durante a transmissão e metadados de protocolo
Uma breve história do bate-papo resistente a metadados Nos últimos anos, a conscientização pública sobre a necessidade e os benefícios das soluções criptografadas de ponta a ponta aumentou com aplicativos como Signal , Whatsapp e Wire. que agora fornecem aos usuários comunicações seguras.
No entanto, essas ferramentas exigem vários níveis de exposição de metadados para funcionar, e muitos desses metadados podem ser usados para obter detalhes sobre como e por que uma pessoa está usando uma ferramenta para se comunicar.
Uma ferramenta que buscou reduzir metadados é o Ricochet lançado pela primeira vez em 2014. Ricochet usou os serviços cebola Tor v2 para fornecer comunicação criptografada segura de ponta a ponta e para proteger os metadados das comunicações.
Não havia servidores centralizados que auxiliassem no roteamento das conversas do Ricochet. Ninguém além das partes envolvidas em uma conversa poderia saber que tal conversa está ocorrendo.
Ricochet tinha limitações; não havia suporte para vários dispositivos, nem existe um mecanismo para suportar a comunicação em grupo ou para um usuário enviar mensagens enquanto um contato está offline.
Isto tornou a adoção do Ricochet uma proposta difícil; mesmo aqueles em ambientes que seriam melhor atendidos pela resistência aos metadados, sem saber que ela existe.
Além disso, qualquer solução para comunicação descentralizada e resistente a metadados enfrenta problemas fundamentais quando se trata de eficiência, privacidade e segurança de grupo conforme definido pelo consenso e consistência da transcrição.
Alternativas modernas ao Ricochet incluem Briar , Zbay e Ricochet Refresh - cada ferramenta procura otimizar para um conjunto diferente de compensações, por exemplo, Briar procura permitir que as pessoas se comuniquem mesmo quando a infraestrutura de rede subjacente está inoperante, ao mesmo tempo que fornece resistência à vigilância de metadados.
O projeto Cwtch começou em 2017 como um protocolo de extensão para Ricochet, fornecendo conversas em grupo por meio de servidores não confiáveis, com o objetivo de permitir aplicativos descentralizados e resistentes a metadados como listas compartilhadas e quadros de avisos.
Uma versão alfa do Cwtch foi lançada em fevereiro de 2019 e, desde então, a equipe do Cwtch dirigida pela OPEN PRIVACY RESEARCH SOCIETY conduziu pesquisa e desenvolvimento em cwtch e nos protocolos, bibliotecas e espaços de problemas subjacentes.
Modelo de Risco.
Sabe-se que os metadados de comunicações são explorados por vários adversários para minar a segurança dos sistemas, para rastrear vítimas e para realizar análises de redes sociais em grande escala para alimentar a vigilância em massa. As ferramentas resistentes a metadados estão em sua infância e faltam pesquisas sobre a construção e a experiência do usuário de tais ferramentas.
https://nostrcheck.me/media/public/nostrcheck.me_9475702740746681051707662826.webp
O Cwtch foi originalmente concebido como uma extensão do protocolo Ricochet resistente a metadados para suportar comunicações assíncronas de grupos multiponto por meio do uso de infraestrutura anônima, descartável e não confiável.
Desde então, o Cwtch evoluiu para um protocolo próprio. Esta seção descreverá os vários riscos conhecidos que o Cwtch tenta mitigar e será fortemente referenciado no restante do documento ao discutir os vários subcomponentes da Arquitetura Cwtch.
Modelo de ameaça.
É importante identificar e compreender que os metadados são omnipresentes nos protocolos de comunicação; é de facto necessário que tais protocolos funcionem de forma eficiente e em escala. No entanto, as informações que são úteis para facilitar peers e servidores também são altamente relevantes para adversários que desejam explorar tais informações.
Para a definição do nosso problema, assumiremos que o conteúdo de uma comunicação é criptografado de tal forma que um adversário é praticamente incapaz de quebrá-lo veja tapir e cwtch para detalhes sobre a criptografia que usamos, e como tal nos concentraremos em o contexto para os metadados de comunicação.
Procuramos proteger os seguintes contextos de comunicação:
• Quem está envolvido em uma comunicação? Pode ser possível identificar pessoas ou simplesmente identificadores de dispositivos ou redes. Por exemplo, “esta comunicação envolve Alice, uma jornalista, e Bob, um funcionário público”.
• Onde estão os participantes da conversa? Por exemplo, “durante esta comunicação, Alice estava na França e Bob estava no Canadá”.
• Quando ocorreu uma conversa? O momento e a duração da comunicação podem revelar muito sobre a natureza de uma chamada, por exemplo, “Bob, um funcionário público, conversou com Alice ao telefone por uma hora ontem à noite. Esta é a primeira vez que eles se comunicam.” *Como a conversa foi mediada? O fato de uma conversa ter ocorrido por meio de um e-mail criptografado ou não criptografado pode fornecer informações úteis. Por exemplo, “Alice enviou um e-mail criptografado para Bob ontem, enquanto eles normalmente enviam apenas e-mails de texto simples um para o outro”.
• Sobre o que é a conversa? Mesmo que o conteúdo da comunicação seja criptografado, às vezes é possível derivar um contexto provável de uma conversa sem saber exatamente o que é dito, por exemplo, “uma pessoa ligou para uma pizzaria na hora do jantar” ou “alguém ligou para um número conhecido de linha direta de suicídio na hora do jantar”. 3 horas da manhã."
Além das conversas individuais, também procuramos defender-nos contra ataques de correlação de contexto, através dos quais múltiplas conversas são analisadas para obter informações de nível superior:
• Relacionamentos: Descobrir relações sociais entre um par de entidades analisando a frequência e a duração de suas comunicações durante um período de tempo. Por exemplo, Carol e Eve ligam uma para a outra todos os dias durante várias horas seguidas.
• Cliques: Descobrir relações sociais entre um grupo de entidades que interagem entre si. Por exemplo, Alice, Bob e Eva se comunicam entre si.
• Grupos vagamente conectados e indivíduos-ponte: descobrir grupos que se comunicam entre si através de intermediários, analisando cadeias de comunicação (por exemplo, toda vez que Alice fala com Bob, ela fala com Carol quase imediatamente depois; Bob e Carol nunca se comunicam).
• Padrão de Vida: Descobrir quais comunicações são cíclicas e previsíveis. Por exemplo, Alice liga para Eve toda segunda-feira à noite por cerca de uma hora. Ataques Ativos
Ataques de deturpação.
O Cwtch não fornece registro global de nomes de exibição e, como tal, as pessoas que usam o Cwtch são mais vulneráveis a ataques baseados em declarações falsas, ou seja, pessoas que fingem ser outras pessoas:
O fluxo básico de um desses ataques é o seguinte, embora também existam outros fluxos:
•Alice tem um amigo chamado Bob e outro chamado Eve
• Eve descobre que Alice tem um amigo chamado Bob
• Eve cria milhares de novas contas para encontrar uma que tenha uma imagem/chave pública semelhante à de Bob (não será idêntica, mas pode enganar alguém por alguns minutos)
• Eve chama essa nova conta de "Eve New Account" e adiciona Alice como amiga.
• Eve então muda seu nome em "Eve New Account" para "Bob"
• Alice envia mensagens destinadas a "Bob" para a conta falsa de Bob de Eve Como os ataques de declarações falsas são inerentemente uma questão de confiança e verificação, a única maneira absoluta de evitá-los é os usuários validarem absolutamente a chave pública. Obviamente, isso não é o ideal e, em muitos casos, simplesmente não acontecerá .
Como tal, pretendemos fornecer algumas dicas de experiência do usuário na interface do usuário para orientar as pessoas na tomada de decisões sobre confiar em contas e/ou distinguir contas que possam estar tentando se representar como outros usuários.
Uma nota sobre ataques físicos A Cwtch não considera ataques que exijam acesso físico (ou equivalente) à máquina do usuário como praticamente defensáveis. No entanto, no interesse de uma boa engenharia de segurança, ao longo deste documento ainda nos referiremos a ataques ou condições que exigem tal privilégio e indicaremos onde quaisquer mitigações que implementámos falharão.
Um perfil Cwtch.
Os usuários podem criar um ou mais perfis Cwtch. Cada perfil gera um par de chaves ed25519 aleatório compatível com Tor.
Além do material criptográfico, um perfil também contém uma lista de Contatos (outras chaves públicas do perfil Cwtch + dados associados sobre esse perfil, como apelido e (opcionalmente) mensagens históricas), uma lista de Grupos (contendo o material criptográfico do grupo, além de outros dados associados, como apelido do grupo e mensagens históricas).
Conversões entre duas partes: ponto a ponto
https://nostrcheck.me/media/public/nostrcheck.me_2186338207587396891707662879.webp
Para que duas partes participem de uma conversa ponto a ponto, ambas devem estar on-line, mas apenas uma precisa estar acessível por meio do serviço Onion. Por uma questão de clareza, muitas vezes rotulamos uma parte como “ponto de entrada” (aquele que hospeda o serviço cebola) e a outra parte como “ponto de saída” (aquele que se conecta ao serviço cebola).
Após a conexão, ambas as partes adotam um protocolo de autenticação que:
• Afirma que cada parte tem acesso à chave privada associada à sua identidade pública.
• Gera uma chave de sessão efêmera usada para criptografar todas as comunicações futuras durante a sessão.
Esta troca (documentada com mais detalhes no protocolo de autenticação ) é negável offline , ou seja, é possível para qualquer parte falsificar transcrições desta troca de protocolo após o fato e, como tal - após o fato - é impossível provar definitivamente que a troca aconteceu de forma alguma.
Após o protocolo de autenticação, as duas partes podem trocar mensagens livremente.
Conversas em Grupo e Comunicação Ponto a Servidor
Ao iniciar uma conversa em grupo, é gerada uma chave aleatória para o grupo, conhecida como Group Key. Todas as comunicações do grupo são criptografadas usando esta chave. Além disso, o criador do grupo escolhe um servidor Cwtch para hospedar o grupo. Um convite é gerado, incluindo o Group Key, o servidor do grupo e a chave do grupo, para ser enviado aos potenciais membros.
Para enviar uma mensagem ao grupo, um perfil se conecta ao servidor do grupo e criptografa a mensagem usando a Group Key, gerando também uma assinatura sobre o Group ID, o servidor do grupo e a mensagem. Para receber mensagens do grupo, um perfil se conecta ao servidor e baixa as mensagens, tentando descriptografá-las usando a Group Key e verificando a assinatura.
Detalhamento do Ecossistema de Componentes
O Cwtch é composto por várias bibliotecas de componentes menores, cada uma desempenhando um papel específico. Algumas dessas bibliotecas incluem:
- abertoprivacidade/conectividade: Abstração de rede ACN, atualmente suportando apenas Tor.
- cwtch.im/tapir: Biblioteca para construção de aplicativos p2p em sistemas de comunicação anônimos.
- cwtch.im/cwtch: Biblioteca principal para implementação do protocolo/sistema Cwtch.
- cwtch.im/libcwtch-go: Fornece ligações C para Cwtch para uso em implementações de UI.
TAPIR: Uma Visão Detalhada
Projetado para substituir os antigos canais de ricochete baseados em protobuf, o Tapir fornece uma estrutura para a construção de aplicativos anônimos.
Está dividido em várias camadas:
• Identidade - Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um par.
• Conexões – O protocolo de rede bruto que conecta dois pares. Até agora, as conexões são definidas apenas através do Tor v3 Onion Services.
• Aplicativos - As diversas lógicas que permitem um determinado fluxo de informações em uma conexão. Os exemplos incluem transcrições criptográficas compartilhadas, autenticação, proteção contra spam e serviços baseados em tokens. Os aplicativos fornecem recursos que podem ser referenciados por outros aplicativos para determinar se um determinado peer tem a capacidade de usar um determinado aplicativo hospedado.
• Pilhas de aplicativos - Um mecanismo para conectar mais de um aplicativo, por exemplo, a autenticação depende de uma transcrição criptográfica compartilhada e o aplicativo peer cwtch principal é baseado no aplicativo de autenticação.
Identidade.
Um par de chaves ed25519, necessário para estabelecer um serviço cebola Tor v3 e usado para manter uma identidade criptográfica consistente para um peer.
InitializeIdentity - de um par de chaves conhecido e persistente:i,I
InitializeEphemeralIdentity - de um par de chaves aleatório: ie,Ie
Aplicativos de transcrição.
Inicializa uma transcrição criptográfica baseada em Merlin que pode ser usada como base de protocolos baseados em compromisso de nível superior
O aplicativo de transcrição entrará em pânico se um aplicativo tentar substituir uma transcrição existente por uma nova (aplicando a regra de que uma sessão é baseada em uma e apenas uma transcrição).
Merlin é uma construção de transcrição baseada em STROBE para provas de conhecimento zero. Ele automatiza a transformação Fiat-Shamir, para que, usando Merlin, protocolos não interativos possam ser implementados como se fossem interativos.
Isto é significativamente mais fácil e menos sujeito a erros do que realizar a transformação manualmente e, além disso, também fornece suporte natural para:
• protocolos multi-round com fases alternadas de commit e desafio;
• separação natural de domínios, garantindo que os desafios estejam vinculados às afirmações a serem provadas;
• enquadramento automático de mensagens, evitando codificação ambígua de dados de compromisso;
• e composição do protocolo, usando uma transcrição comum para vários protocolos.
Finalmente, o Merlin também fornece um gerador de números aleatórios baseado em transcrição como defesa profunda contra ataques de entropia ruim (como reutilização de nonce ou preconceito em muitas provas). Este RNG fornece aleatoriedade sintética derivada de toda a transcrição pública, bem como dos dados da testemunha do provador e uma entrada auxiliar de um RNG externo.
Conectividade Cwtch faz uso do Tor Onion Services (v3) para todas as comunicações entre nós.
Fornecemos o pacote openprivacy/connectivity para gerenciar o daemon Tor e configurar e desmontar serviços cebola através do Tor.
Criptografia e armazenamento de perfil.
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir uma senha.
Perfis não criptografados e a senha padrão Para lidar com perfis "não criptografados" (ou seja, que não exigem senha para serem abertos), atualmente criamos um perfil com uma senha codificada de fato .
Isso não é o ideal, preferiríamos confiar no material de chave fornecido pelo sistema operacional, de modo que o perfil fosse vinculado a um dispositivo específico, mas esses recursos são atualmente uma colcha de retalhos - também notamos, ao criar um perfil não criptografado, pessoas que usam Cwtch estão explicitamente optando pelo risco de que alguém com acesso ao sistema de arquivos possa descriptografar seu perfil.
Vulnerabilidades Relacionadas a Imagens e Entrada de Dados
Imagens Maliciosas
O Cwtch enfrenta desafios na renderização de imagens, com o Flutter utilizando Skia, embora o código subjacente não seja totalmente seguro para a memória.
Realizamos testes de fuzzing nos componentes Cwtch e encontramos um bug de travamento causado por um arquivo GIF malformado, levando a falhas no kernel. Para mitigar isso, adotamos a política de sempre habilitar cacheWidth e/ou cacheHeight máximo para widgets de imagem.
Identificamos o risco de imagens maliciosas serem renderizadas de forma diferente em diferentes plataformas, como evidenciado por um bug no analisador PNG da Apple.
Riscos de Entrada de Dados
Um risco significativo é a interceptação de conteúdo ou metadados por meio de um Input Method Editor (IME) em dispositivos móveis. Mesmo aplicativos IME padrão podem expor dados por meio de sincronização na nuvem, tradução online ou dicionários pessoais.
Implementamos medidas de mitigação, como enableIMEPersonalizedLearning: false no Cwtch 1.2, mas a solução completa requer ações em nível de sistema operacional e é um desafio contínuo para a segurança móvel.
Servidor Cwtch.
O objetivo do protocolo Cwtch é permitir a comunicação em grupo através de infraestrutura não confiável .
Ao contrário dos esquemas baseados em retransmissão, onde os grupos atribuem um líder, um conjunto de líderes ou um servidor confiável de terceiros para garantir que cada membro do grupo possa enviar e receber mensagens em tempo hábil (mesmo que os membros estejam offline) - infraestrutura não confiável tem o objetivo de realizar essas propriedades sem a suposição de confiança.
O artigo original do Cwtch definia um conjunto de propriedades que se esperava que os servidores Cwtch fornecessem:
• O Cwtch Server pode ser usado por vários grupos ou apenas um.
• Um servidor Cwtch, sem a colaboração de um membro do grupo, nunca deve aprender a identidade dos participantes de um grupo.
• Um servidor Cwtch nunca deve aprender o conteúdo de qualquer comunicação.
• Um servidor Cwtch nunca deve ser capaz de distinguir mensagens como pertencentes a um grupo específico. Observamos aqui que essas propriedades são um superconjunto dos objetivos de design das estruturas de Recuperação de Informações Privadas.
Melhorias na Eficiência e Segurança
Eficiência do Protocolo
Atualmente, apenas um protocolo conhecido, o PIR ingênuo, atende às propriedades desejadas para garantir a privacidade na comunicação do grupo Cwtch. Este método tem um impacto direto na eficiência da largura de banda, especialmente para usuários em dispositivos móveis. Em resposta a isso, estamos ativamente desenvolvendo novos protocolos que permitem negociar garantias de privacidade e eficiência de maneiras diversas.
Os servidores, no momento desta escrita, permitem o download completo de todas as mensagens armazenadas, bem como uma solicitação para baixar mensagens específicas a partir de uma determinada mensagem. Quando os pares ingressam em um grupo em um novo servidor, eles baixam todas as mensagens do servidor inicialmente e, posteriormente, apenas as mensagens novas.
Mitigação de Análise de Metadados
Essa abordagem permite uma análise moderada de metadados, pois o servidor pode enviar novas mensagens para cada perfil suspeito exclusivo e usar essas assinaturas de mensagens exclusivas para rastrear sessões ao longo do tempo. Essa preocupação é mitigada por dois fatores:
- Os perfis podem atualizar suas conexões a qualquer momento, resultando em uma nova sessão do servidor.
- Os perfis podem ser "ressincronizados" de um servidor a qualquer momento, resultando em uma nova chamada para baixar todas as mensagens. Isso é comumente usado para buscar mensagens antigas de um grupo.
Embora essas medidas imponham limites ao que o servidor pode inferir, ainda não podemos garantir resistência total aos metadados. Para soluções futuras para esse problema, consulte Niwl.
Proteção contra Pares Maliciosos
Os servidores enfrentam o risco de spam gerado por pares, representando uma ameaça significativa à eficácia do sistema Cwtch. Embora tenhamos implementado um mecanismo de proteção contra spam no protótipo do Cwtch, exigindo que os pares realizem alguma prova de trabalho especificada pelo servidor, reconhecemos que essa não é uma solução robusta na presença de um adversário determinado com recursos significativos.
Pacotes de Chaves
Os servidores Cwtch se identificam por meio de pacotes de chaves assinados, contendo uma lista de chaves necessárias para garantir a segurança e resistência aos metadados na comunicação do grupo Cwtch. Esses pacotes de chaves geralmente incluem três chaves: uma chave pública do serviço Tor v3 Onion para o Token Board, uma chave pública do Tor v3 Onion Service para o Token Service e uma chave pública do Privacy Pass.
Para verificar os pacotes de chaves, os perfis que os importam do servidor utilizam o algoritmo trust-on-first-use (TOFU), verificando a assinatura anexada e a existência de todos os tipos de chave. Se o perfil já tiver importado o pacote de chaves do servidor anteriormente, todas as chaves são consideradas iguais.
Configuração prévia do aplicativo para ativar o Relé do Cwtch.
No Android, a hospedagem de servidor não está habilitada, pois essa opção não está disponível devido às limitações dos dispositivos Android. Essa funcionalidade está reservada apenas para servidores hospedados em desktops.
No Android, a única forma direta de importar uma chave de servidor é através do grupo de teste Cwtch, garantindo assim acesso ao servidor Cwtch.
Primeiro passo é Habilitar a opção de grupo no Cwtch que está em fase de testes. Clique na opção no canto superior direito da tela de configuração e pressione o botão para acessar as configurações do Cwtch.
Você pode alterar o idioma para Português do Brasil.Depois, role para baixo e selecione a opção para ativar os experimentos. Em seguida, ative a opção para habilitar o chat em grupo e a pré-visualização de imagens e fotos de perfil, permitindo que você troque sua foto de perfil.
https://link.storjshare.io/raw/jvss6zxle26jdguwaegtjdixhfka/production/f0ca039733d48895001261ab25c5d2efbaf3bf26e55aad3cce406646f9af9d15.MP4
Próximo passo é Criar um perfil.
Pressione o + botão de ação no canto inferior direito e selecione "Novo perfil" ou aberta no botão + adicionar novo perfil.
-
Selecione um nome de exibição
-
Selecione se deseja proteger
este perfil e salvo localmente com criptografia forte: Senha: sua conta está protegida de outras pessoas que possam usar este dispositivo
Sem senha: qualquer pessoa que tenha acesso a este dispositivo poderá acessar este perfil.
Preencha sua senha e digite-a novamente
Os perfis são armazenados localmente no disco e criptografados usando uma chave derivada de uma senha conhecida pelo usuário (via pbkdf2).
Observe que, uma vez criptografado e armazenado em disco, a única maneira de recuperar um perfil é recuperando a chave da senha - como tal, não é possível fornecer uma lista completa de perfis aos quais um usuário pode ter acesso até inserir um senha.
https://link.storjshare.io/raw/jxqbqmur2lcqe2eym5thgz4so2ya/production/8f9df1372ec7e659180609afa48be22b12109ae5e1eda9ef1dc05c1325652507.MP4
O próximo passo é adicionar o FuzzBot, que é um bot de testes e de desenvolvimento.
Contato do FuzzBot: 4y2hxlxqzautabituedksnh2ulcgm2coqbure6wvfpg4gi2ci25ta5ad.
Ao enviar o comando "testgroup-invite" para o FuzzBot, você receberá um convite para entrar no Grupo Cwtch Test. Ao ingressar no grupo, você será automaticamente conectado ao servidor Cwtch. Você pode optar por sair do grupo a qualquer momento ou ficar para conversar e tirar dúvidas sobre o aplicativo e outros assuntos. Depois, você pode configurar seu próprio servidor Cwtch, o que é altamente recomendável.
https://link.storjshare.io/raw/jvji25zclkoqcouni5decle7if7a/production/ee3de3540a3e3dca6e6e26d303e12c2ef892a5d7769029275b8b95ffc7468780.MP4
Agora você pode utilizar o aplicativo normalmente. Algumas observações que notei: se houver demora na conexão com outra pessoa, ambas devem estar online. Se ainda assim a conexão não for estabelecida, basta clicar no ícone de reset do Tor para restabelecer a conexão com a outra pessoa.
Uma introdução aos perfis Cwtch.
Com Cwtch você pode criar um ou mais perfis . Cada perfil gera um par de chaves ed25519 aleatório compatível com a Rede Tor.
Este é o identificador que você pode fornecer às pessoas e que elas podem usar para entrar em contato com você via Cwtch.
Cwtch permite criar e gerenciar vários perfis separados. Cada perfil está associado a um par de chaves diferente que inicia um serviço cebola diferente.
Gerenciar Na inicialização, o Cwtch abrirá a tela Gerenciar Perfis. Nessa tela você pode:
- Crie um novo perfil.
- Desbloquear perfis.
- Criptografados existentes.
- Gerenciar perfis carregados.
- Alterando o nome de exibição de um perfil.
- Alterando a senha de um perfil Excluindo um perfil.
- Alterando uma imagem de perfil.
Backup ou exportação de um perfil.
Na tela de gerenciamento de perfil:
-
Selecione o lápis ao lado do perfil que você deseja editar
-
Role para baixo até a parte inferior da tela.
-
Selecione "Exportar perfil"
-
Escolha um local e um nome de arquivo.
5.confirme.
Uma vez confirmado, o Cwtch colocará uma cópia do perfil no local indicado. Este arquivo é criptografado no mesmo nível do perfil.
Este arquivo pode ser importado para outra instância do Cwtch em qualquer dispositivo.
Importando um perfil.
-
Pressione o +botão de ação no canto inferior direito e selecione "Importar perfil"
-
Selecione um arquivo de perfil Cwtch exportado para importar
-
Digite a senha associada ao perfil e confirme.
Uma vez confirmado, o Cwtch tentará descriptografar o arquivo fornecido usando uma chave derivada da senha fornecida. Se for bem-sucedido, o perfil aparecerá na tela Gerenciamento de perfil e estará pronto para uso.
OBSERVAÇÃO Embora um perfil possa ser importado para vários dispositivos, atualmente apenas uma versão de um perfil pode ser usada em todos os dispositivos ao mesmo tempo. As tentativas de usar o mesmo perfil em vários dispositivos podem resultar em problemas de disponibilidade e falhas de mensagens.
Qual é a diferença entre uma conexão ponto a ponto e um grupo cwtch?
As conexões ponto a ponto Cwtch permitem que 2 pessoas troquem mensagens diretamente. As conexões ponto a ponto nos bastidores usam serviços cebola Tor v3 para fornecer uma conexão criptografada e resistente a metadados. Devido a esta conexão direta, ambas as partes precisam estar online ao mesmo tempo para trocar mensagens.
Os Grupos Cwtch permitem que várias partes participem de uma única conversa usando um servidor não confiável (que pode ser fornecido por terceiros ou auto-hospedado). Os operadores de servidores não conseguem saber quantas pessoas estão em um grupo ou o que está sendo discutido. Se vários grupos estiverem hospedados em um único servidor, o servidor não conseguirá saber quais mensagens pertencem a qual grupo sem a conivência de um membro do grupo. Ao contrário das conversas entre pares, as conversas em grupo podem ser conduzidas de forma assíncrona, para que todos num grupo não precisem estar online ao mesmo tempo.
Por que os grupos cwtch são experimentais? Mensagens em grupo resistentes a metadados ainda são um problema em aberto . Embora a versão que fornecemos no Cwtch Beta seja projetada para ser segura e com metadados privados, ela é bastante ineficiente e pode ser mal utilizada. Como tal, aconselhamos cautela ao usá-lo e apenas o fornecemos como um recurso opcional.
Como posso executar meu próprio servidor Cwtch? A implementação de referência para um servidor Cwtch é de código aberto . Qualquer pessoa pode executar um servidor Cwtch, e qualquer pessoa com uma cópia do pacote de chaves públicas do servidor pode hospedar grupos nesse servidor sem que o operador tenha acesso aos metadados relacionados ao grupo .
https://git.openprivacy.ca/cwtch.im/server
https://docs.openprivacy.ca/cwtch-security-handbook/server.html
Como posso desligar o Cwtch? O painel frontal do aplicativo possui um ícone do botão "Shutdown Cwtch" (com um 'X'). Pressionar este botão irá acionar uma caixa de diálogo e, na confirmação, o Cwtch será desligado e todos os perfis serão descarregados.
Suas doações podem fazer a diferença no projeto Cwtch? O Cwtch é um projeto dedicado a construir aplicativos que preservam a privacidade, oferecendo comunicação de grupo resistente a metadados. Além disso, o projeto também desenvolve o Cofre, formulários da web criptografados para ajudar mútua segura. Suas contribuições apoiam iniciativas importantes, como a divulgação de violações de dados médicos em Vancouver e pesquisas sobre a segurança do voto eletrônico na Suíça. Ao doar, você está ajudando a fechar o ciclo, trabalhando com comunidades marginalizadas para identificar e corrigir lacunas de privacidade. Além disso, o projeto trabalha em soluções inovadoras, como a quebra de segredos através da criptografia de limite para proteger sua privacidade durante passagens de fronteira. E também tem a infraestrutura: toda nossa infraestrutura é open source e sem fins lucrativos. Conheça também o Fuzzytags, uma estrutura criptográfica probabilística para marcação resistente a metadados. Sua doação é crucial para continuar o trabalho em prol da privacidade e segurança online. Contribua agora com sua doação
https://openprivacy.ca/donate/
onde você pode fazer sua doação em bitcoin e outras moedas, e saiba mais sobre os projetos. https://openprivacy.ca/work/
Link sobre Cwtch
https://cwtch.im/
https://git.openprivacy.ca/cwtch.im/cwtch
https://docs.cwtch.im/docs/intro
https://docs.openprivacy.ca/cwtch-security-handbook/
Baixar #CwtchDev
cwtch.im/download/
https://play.google.com/store/apps/details?id=im.cwtch.flwtch
-
@ 8cb60e21:5f2deaea
2024-09-06 22:23:03 -
@ 12cfc2ec:6967f1d9
2024-10-15 19:49:22this is in response to Shinobis recent piece occupy bitcoin found here
https://bitcoinmagazine.com/culture/occupy-bitcoin-bitcoin-is-not-just-libertarian?new
Occupy bitcoin is a thing every single one of us tries to do. There isn't a single one individual that doesn’t see bitcoin for what it is and have it not occupy all of them to varying degrees. There’s an innate fascination with coming upon previously unknown knowledge and become overtly obsessed with it and exploring all of the facets in which the new knowledge can be applied. When one does so, it normally can lead to finding previously unknown areas that you come to find with the more that you learn you find out just how much you truly don’t understand.
Now with this being the foundation of what all of humans are doing. None of us, not ONE, know everything. Its a fallacious argument to claim to do. In the journey for the discovery that is truth one can happen to fall upon the political rabbit hole that can be called or dubbed Libertarianism/Anarchism/ AnCap/AnCom etc. I use these labels very lightly as they are just words at the end of the day words mean different things to different people. I cant know what these words mean to you dear reader but I can only know what they mean to me, and my journey specifically. What we as humans do is to come to an agreement upon to what does these words mean to the both of us when we are communicating them to each other. I do my best to not fall into being pigeon holed into believing or having to defend that when I say one of the aforementioned words that I should have to commit to whatever it is your preconceived understanding of what that is. We must remember that these words are collectivized terms, they are strictly USEFUL fictions that we humans use in order to better conceptualize the ideas to better understand. That to take any attribute pulled from any one of the above and blanket paint “some” or “most” individuals that claim to align with above ideologies/alignments/political beliefs that these individuals represent that is an absurd claim. One cannot claim that individuals acting in mean/harsh ways when facing others who don’t agree with them is the wrong way to act.
We are humans we disagree, were free to act as we please to anyone we wish to do so. We’re NEVER free to ignore the consequences of those actions. One could characterize the vehement disdain for the acceptance all ideas, and letting others have their own opinions, is how we as individuals got here in the first place. It was the ideas of society being more important than the whole that had legitimized the aggression sanctified by the state as an omnipotent entity free from doing no wrong in lieu of the greater good. Individuals can do as such with their minds as they please but your actions of freedom stop at the point of my nose begins. The individuals that understand freedom and its core philosophy understand this. Treating one side as an evil and the other side as some glorified good is a cop out of intellectual dishonesty.
In the realm of bitcoin there can be disagreements and even out right hostility towards any number of ideas/opinions. This is the nature of freedom itself. As I’ve seen it and as I have championed it myself do with freedom what you will, but whatever you do if I think its stupid I’m going to tell you its stupid. Social pressures have been with human civilizations for thousands of years to think that the idea of attacks to your ideas not being a thing because we should accept all ideas and be kind to differing opinions is a farce at best and some unicorn fart huffing at worst. It was the individuals that were unwavering IN SPITE of the social attacks, the public slandering, the outright social ostracization, the being called dumb and stupid that paved the way for the best and most historical moments in history Ideas don’t care about these passing affronts. If your viewpoint/idea needs soft corners to gain traction then maybe you should reassess your idea in the first place. The battleground that is the societal/accepted norm isn't one that’s for the faint of heart. Everyone has limited time and resources available to them if they are choosing not to hear you then its probably time to seek out others to speak to. In the realm of freedom everyone CAN choose any ideas they wish to follow and interact with others that agree, where that stops is you can NO LONGER force everyone else to participate in your own shared delusions with the others you associate with. The freedom to EXCLUDE is one of the core tenets of freedom principles. We DO NOT have to be accepting of everyone if we do not wish to do so, the belief that everyone should ALWAYS accept everyone and everything is a communistic one. No one individual has the time and resources to accept every person and accept or contemplate every single idea presented to him. What freedom DOES allow for is for YOU to find the individuals that ARE accepting of your views/beliefs and do with that what you wish.
By trying to call out one group of individuals as being too “tribal” in what they view as the best course of action for themselves while SIMULTANEOUSLY praising another group for their favored tenets of “acceptance” is a laughable and down right sad view that “everyone should be more like the accepting crowd”. It is only through the choices we make that we get to where we are going on this journey. Those choices are inherently going to REQUIRE dissociation, omission, & exclusion.
The ideologies/beliefs mentioned at the beginning of this article are only a starting point to the journey. They are in no way shape or from a claim to be a complete set of knowledge's that allow everyone to be able to navigate this earth. Are some things flawed? Probably. Do some things work for some and not others? Absolutely. But the major core belief at all of them is the belief that violence is never permitted, in all its facets to the individual liberty of the person. Its the only morally justifiable way to navigate life. This is in and of itself the most open and accepting philosophy of all life choices.
Individuals can do with their lives as they please, nobody is stopping you from doing that, but you because someone said some mean things to me about what I believe. Its about time some individuals get that we must remain steadfast in our mission. We don’t get there by being nice to everyone. We only get there by allowing everyone to do what they wish and not expecting others to bend to our will because you hurt my feelings.
The ultimate arbiter for what you should pick and choose is you the individual, don’t let others decide that for you. Don’t be a passenger in your own life, take that wheel and choose for yourself where you are headed. But if you're going to let someone who was mean to you stop you from using probably the greatest tool that a human has ever invented, then maybe there isn't hope for humanity after all. The one thing that I know for sure is that there is one thing that that can hinder you or augment you, that thing is choice. Embrace it.
-
@ 7e538978:a5987ab6
2024-10-02 13:57:31Chain Duel, a fast paced PvP game that takes inspiration from the classic snake game and supercharges it with Bitcoin’s Lightning Network. Imagine battling another player for dominance in a race to collect blocks, where the length of your chain isn’t just a visual cue. It represents real, staked satoshis. The player with the most Proof of Work wins, but it’s not just about gameplay; it’s about the seamless integration of the Lightning Network and real-time payments.
But how does Chain Duel manage these instant transactions with such efficiency? That’s where LNbits comes in. LNbits, an open-source wallet and payment infrastructure, handles all in-game payments making it easy for developers to focus on gameplay while LNbits takes care of everything from microtransactions to automated splits for developers and designers. In this article, we’ll dive deep into how Chain Duel leverages LNbits to streamline in-game payments and how other developers can take advantage of this powerful toolset to build the future of Lightning-powered gaming.
Let’s explore how LNbits transforms payment processing and why it’s quickly becoming a must-have for game developers working in the Bitcoin space.
Overview of Chain Duel
Chain Duel is a unique Lightning Network-inspired game that reimagines the classic snake game with a competitive twist, integrating real-time payments. Two players face off in real-time, racing to "catch" blocks and extend their chains. Each block added to the chain represents Proof of Work, and the player with the most Proof of Work wins the duel. The stakes are high, as the game represents satoshis (small units of Bitcoin) as points, with the winner taking home the prize.
The game is designed to be Lightning-native, meaning all payments within Chain Duel are processed through the Lightning Network. This ensures fast payments, reducing latency and making gameplay smooth. With additional features like practice mode, tournaments and highscores, Chain Duel creates an engaging and competitive environment for Bitcoin enthusiasts and gamers alike.
One of the standout aspects of Chain Duel is its deeper integration with the Lightning Network even at a design level. For example, actual Bitcoin blocks can appear on screen during matches, offering bonus points when mined in sync with the game. The game’s current version, still in beta, has already drawn attention within the Bitcoin community, gaining momentum at conferences and with a growing user base through its social networks. With its innovative combination of gaming, the Lightning Network, and competitive play, Chain Duel offers a glimpse into the future of Lightning-based gaming.
How LNbits is Used in Chain Duel
Seamless Integration with LNbits
At the core of Chain Duel’s efficient payment processing is LNbits, which handles in-game transactions smoothly and reliably. Chain Duel uses the LNbits LNURL-pay and LNURL-withdraw extensions to manage payments and rewards between players. Before each match, players send satoshis using LNURL-pay, which generates a static QR code or link for making the payment. LNURL-pay allows users to attach a note to the payment, which Chain Duel creatively uses as a way to insert the player name in-game. The simplicity of LNURL-pay ensures that users can quickly and easily initiate games, with fresh invoices being issued for every game. When players win, LNURL-withdraw enables them to seamlessly pull their earnings from the game, providing a quick payout system.
These extensions make it easy for players to send and receive Bitcoin with minimal latency, fully leveraging the power of the Lightning Network for fast and low-cost payments. The flexibility of LNbits’ tools means that game developers don’t need to worry about building custom payment systems from scratch—they can rely on LNbits to handle all financial transactions with precision.
Lightning Tournaments
Chain Duel tournaments leverage LNbits and its LNURL extensions to create a seamless and efficient experience for players. In Chain Duel tournaments, LNbits plays a crucial role in managing the overall economics. LNbits facilitates the generation of LNURL QR codes that participants can scan to register quickly or withdraw their winnings. LNbits allows Chain Duel to automatically handle multiple registrations through LNURL-pay, enabling players to participate in the tournament without additional steps. The Lightning Network's speed ensures that these payments occur in real-time, reducing wait times and allowing for a smoother flow in-game.
Splitting Payments
LNbits further simplifies revenue-sharing within Chain Duel. This feature allows the game to automatically split the satoshis sent by players into different shares for the game’s developer, designer, and host. Each time a payment is made to join a match, LNbits is used to automattically pay each of the contributors, according to pre-defined rules. This automated process ensures that everyone involved in the development and running of the game gets their fair share without manual intervention or complex bookkeeping.
Nostr Integration
Chain Duel also integrates with Nostr, a decentralized protocol for social interactions. Players can join games using "Zaps", small tips or micropayments sent over the Lightning Network within the Nostr ecosystem. Through NIP-57, which enables Nostr clients to request Zap invoices, players can use LNURL-pay enabled Zaps to register in P2P matches, further enhancing the Chain Duel experience. By using Zaps as a way to register in-game, Chain Duel automates the process of fetching players' identity, creating a more competitive and social experience. Zaps are public on the Nostr network, further expanding Chain Duel's games social reach and community engagement.
Game and Payment Synchronization
One of the key reasons Chain Duel developers chose LNbits is its powerful API that connects directly with the game’s logic. LNbits allows the game to synchronize payments with gameplay in real-time, providing a seamless experience where payments are an integrated part of the gaming mechanics.
With LNbits managing both the payment process and the Lightning Network’s complex infrastructure, Chain Duel developers are free to concentrate on enhancing the competitive and Lightning Network-related aspects of the game. This division of tasks is essential for streamlining development while still providing an innovative in-game payment experience that is deeply integrated with the Bitcoin network.
LNbits proves to be an indispensable tool for Chain Duel, enabling smooth in-game transactions, real-time revenue sharing, and seamless integration with Nostr. For developers looking to build Lightning-powered games, LNbits offers a powerful suite of tools that handle everything from micropayments to payment distribution—ensuring that the game's focus remains on fun and competition rather than complex payment systems.
LNBits facilitating Education and Adoption
This system contributes to educating users on the power of the Lightning Network. Since Chain Duel directly involve real satoshis and LNURL for registration and rewards, players actively experience how Lightning can facilitate fast, cheap, and permissionless payments. By incorporating LNbits into Chain Duel, the game serves as an educational tool that introduces users to the benefits of the Lightning Network. Players gain direct experience using Lightning wallets and LNURL, helping them understand how these tools work in real-world scenarios. The near-instant nature of these payments showcases the power of Lightning in a practical context, highlighting its potential beyond just gaming. Players are encouraged to set up wallets, explore the Lightning ecosystem, and eventually become familiar with Bitcoin and Lightning technology. By integrating LNbits, Chain Duel transforms in-game payments into a learning opportunity, making Bitcoin and Lightning more approachable for users worldwide.
Tools for Developers
LNbits is a versatile, open-source platform designed to simplify and enhance Bitcoin Lightning Network wallet management. For developers, particularly those working on Lightning-native games like Chain Duel, LNbits offers an invaluable set of tools that allow for seamless integration of Lightning payments without the need to build complex custom solutions from scratch. LNbits is built on a modular and extensible architecture, enabling developers to easily add or create functionality suited to their project’s needs.
Extensible Architecture for Customization
At the core of LNbits is a simple yet powerful wallet system that developers can access across multiple devices. What makes LNbits stand out is its extensible nature—everything beyond the core functionality is implemented as an extension. This modular approach allows users to customize their LNbits installation by enabling or building extensions to suit specific use cases. This flexibility is perfect for developers who want to add Lightning-based services to their games or apps without modifying the core codebase.
- Extensions for Every Use Case
LNbits comes with a wide array of built-in extensions created by contributors, offering various services that can be plugged into your application. Some popular extensions include: - Faucets: Distribute small amounts of Bitcoin to users for testing or promotional purposes.
- Paylinks: Create shareable links for instant payments.
- Points-of-sale (PoS): Allow users to set up shareable payment terminals.
- Paywalls: Charge users to access content or services.
- Event tickets: Sell tickets for events directly via Lightning payments.
- Games and services: From dice games to jukeboxes, LNbits offers entertaining and functional tools.
These ready-made solutions can be adapted and used in different gaming scenarios, for example in Chain Duel, where LNURL extensions are used for in game payments. The extensibility ensures developers can focus on building engaging gameplay while LNbits handles payment flows.
Developer-Friendly Customization
LNbits isn't just a plug-and-play platform. Developers can extend its functionality even further by creating their own extensions, giving full control over how the wallet system is integrated into their games or apps. The architecture is designed to make it easy for developers to build on top of the platform, adding custom features for specific requirements.
Flexible Funding Source Management
LNbits also offers flexibility in terms of managing funding sources. Developers can easily connect LNbits to various Lightning Network node implementations, enabling seamless transitions between nodes or even different payment systems. This allows developers to switch underlying funding sources with minimal effort, making LNbits adaptable for games that may need to scale quickly or rely on different payment infrastructures over time.
A Lean Core System for Maximum Efficiency
Thanks to its modular architecture, LNbits maintains a lean core system. This reduces complexity and overhead, allowing developers to implement only the features they need. By avoiding bloated software, LNbits ensures faster transactions and less resource consumption, which is crucial in fast-paced environments like Chain Duel where speed and efficiency are paramount.
LNbits is designed with developers in mind, offering a suite of tools and a flexible infrastructure that makes integrating Bitcoin payments easy. Whether you’re developing games, apps, or any service that requires Lightning Network transactions, LNbits is a powerful, open-source solution that can be adapted to fit your project.
Conclusion
Chain Duel stands at the forefront of Lightning-powered gaming, combining the excitement of competitive PvP with the speed and efficiency of the Lightning Network. With LNbits handling all in-game payments, from microtransactions to automated revenue splits, developers can focus entirely on crafting an engaging gaming experience. LNbits’ powerful API and extensions make it easy to manage real-time payments, removing the complexity of building payment infrastructure from scratch.
LNbits isn’t just a payment tool — it’s a flexible, developer-friendly platform that can be adapted to any gaming model. Whether you're developing a fast-paced PvP game like Chain Duel or any project requiring seamless Lightning Network integration, LNbits provides the ideal solution for handling instant payments with minimal overhead.
For developers interested in pushing the boundaries of Lightning-powered gaming, Chain Duel is a great example of how LNbits can enhance your game, letting you focus on the fun while LNbits manages real-time transactions.
Find out more
Curious about how Lightning Network payments can power your next game? Explore the following:
- Learn more about Chain Duel: Chain Duel
- Learn how LNbits can simplify payment handling in your project: LNbits
- Dive into decentralized communication with Nostr: Nostr
- Extensions for Every Use Case
-
@ c4f5e7a7:8856cac7
2024-09-27 08:20:16Best viewed on Habla, YakiHonne or Highlighter.
TL;DR
This article explores the links between public, community-driven data sources (such as OpenStreetMap) and private, cryptographically-owned data found on networks such as Nostr.
The following concepts are explored:
- Attestations: Users signalling to their social graph that they believe something to be true by publishing Attestations. These social proofs act as a decentralised verification system that leverages your web-of-trust.
- Proof of Place: An oracle-based system where physical letters are sent to real-world locations, confirming the corresponding digital ownership via cryptographic proofs. This binds physical locations in meatspace with their digital representations in the Nostrverse.
- Check-ins: Foursquare-style check-ins that can be verified using attestations from place owners, ensuring authenticity. This approach uses web-of-trust to validate check-ins and location ownership over time.
The goal is to leverage cryptographic ownership where necessary while preserving the open, collaborative nature of public data systems.
Open Data in a public commons has a place and should not be thrown out with the Web 2.0 bathwater.
Cognitive Dissonance
Ever since discovering Nostr in August of 2022 I've been grappling with how BTC Map - a project that helps bitcoiners find places to spend sats - should most appropriately use this new protocol.
I am assuming, dear reader, that you are somewhat familiar with Nostr - a relatively new protocol for decentralised identity and communication. If you don’t know your nsec from your npub, please take some time to read these excellent posts: Nostr is Identity for the Internet and The Power of Nostr by @max and @lyn, respectively. Nostr is so much more than a short-form social media replacement.
The social features (check-ins, reviews, etc.) that Nostr unlocks for BTC Map are clear and exciting - all your silos are indeed broken - however, something fundamental has been bothering me for a while and I think it comes down to data ownership.
For those unfamiliar, BTC Map uses OpenStreetMap (OSM) as its main geographic database. OSM is centred on the concept of a commons of objectively verifiable data that is maintained by a global community of volunteer editors; a Wikipedia for maps. There is no data ownership; the data is free (as in freedom) and anyone can edit anything. It is the data equivalent of FOSS (Free and Open Source Software) - FOSD if you will, but more commonly referred to as Open Data.
In contrast, Notes and Other Stuff on Nostr (Places in this cartographic context) are explicitly owned by the controller of the private key. These notes are free to propagate, but they are owned.
How do we reconcile the decentralised nature of Nostr, where data is cryptographically owned by individuals, with the community-managed data commons of OpenStreetMap, where no one owns the data?
Self-sovereign Identity
Before I address this coexistence question, I want to talk a little about identity as it pertains to ownership. If something is to be owned, it has to be owned by someone or something - an identity.
All identities that are not self-sovereign are, by definition, leased to you by a 3rd party. You rent your Facebook identity from Meta in exchange for your data. You rent your web domain from your DNS provider in exchange for your money.
Taken to the extreme, you rent your passport from your Government in exchange for your compliance. You are you at the pleasure of others. Where Bitcoin separates money from the state; Nostr separates identity from the state.
Or, as @nvk said recently: "Don't build your house on someone else's land.".
https://i.nostr.build/xpcCSkDg3uVw0yku.png
While we’ve had the tools for self-sovereign digital identity for decades (think PGP keys or WebAuthN), we haven't had the necessary social use cases nor the corresponding social graph to elevate these identities to the mainstream. Nostr fixes this.
Nostr is PGP for the masses and will take cryptographic identities mainstream.
Full NOSTARD?
Returning to the coexistence question: the data on OpenStreetMap isn’t directly owned by anyone, even though the physical entities the data represents might be privately owned. OSM is a data commons.
We can objectively agree on the location of a tree or a fire hydrant without needing permission to observe and record it. Sure, you could place a tree ‘on Nostr’, but why should you? Just because something can be ‘on Nostr’ doesn’t mean it should be.
https://i.nostr.build/s3So2JVAqoY4E1dI.png
There might be a dystopian future where we can't agree on what a tree is nor where it's located, but I hope we never get there. It's at this point we'll need a Wikifreedia variant of OpenStreetMap.
While integrating Nostr identities into OpenStreetMap would be valuable, the current OSM infrastructure, tools, and community already provide substantial benefits in managing this data commons without needing to go NOSTR-native - there's no need to go Full NOSTARD. H/T to @princeySOV for the original meme.
https://i.nostr.build/ot9jtM5cZtDHNKWc.png
So, how do we appropriately blend cryptographically owned data with the commons?
If a location is owned in meatspace and it's useful to signal that ownership, it should also be owned in cyberspace. Our efforts should therefore focus on entities like businesses, while allowing the commons to manage public data for as long as it can successfully mitigate the tragedy of the commons.
The remainder of this article explores how we can:
- Verify ownership of a physical place in the real world;
- Link that ownership to the corresponding digital place in cyberspace.
As a side note, I don't see private key custodianship - or, even worse, permissioned use of Places signed by another identity's key - as any more viable than the rented identities of Web 2.0.
And as we all know, the Second Law of Infodynamics (no citation!) states that:
"The total amount of sensitive information leaked will always increase over time."
This especially holds true if that data is centralised.
Not your keys, not your notes. Not your keys, not your identity.
Places and Web-of-Trust
@Arkinox has been leading the charge on the Places NIP, introducing Nostr notes (kind 37515) that represent physical locations. The draft is well-crafted, with bonus points for linking back to OSM (and other location repositories) via NIP-73 - External Content IDs (championed by @oscar of @fountain).
However, as Nostr is permissionless, authenticity poses a challenge. Just because someone claims to own a physical location on the Internet doesn’t necessarily mean they have ownership or control of that location in the real world.
Ultimately, this problem can only be solved in a decentralised way by using Web-of-Trust - using your social graph and the perspectives of trusted peers to inform your own perspective. In the context of Places, this requires your network to form a view on which digital identity (public key / npub) is truly the owner of a physical place like your local coffee shop.
This requires users to:
- Verify the owner of a Place in cyberspace is the owner of a place in meatspace.
- Signal this verification to their social graph.
Let's look at the latter idea first with the concept of Attestations ...
Attestations
A way to signal to your social graph that you believe something to be true (or false for that matter) would be by publishing an Attestation note. An Attestation note would signify to your social graph that you think something is either true or false.
Imagine you're a regular at a local coffee shop. You publish an Attestation that says the shop is real and the owner behind the Nostr public key is who they claim to be. Your friends trust you, so they start trusting the shop's digital identity too.
However, attestations applied to Places are just a single use case. The attestation concept could be more widely applied across Nostr in a variety of ways (key rotation, identity linking, etc).
Here is a recent example from @lyn that would carry more signal if it were an Attestation:
https://i.nostr.build/lZAXOEwvRIghgFY4.png
Parallels can be drawn between Attestations and transaction confirmations on the Bitcoin timechain; however, their importance to you would be weighted by clients and/or Data Vending Machines in accordance with:
- Your social graph;
- The type or subject of the content being attested and by whom;
- Your personal preferences.
They could also have a validity duration to be temporally bound, which would be particularly useful in the case of Places.
NIP-25 (Reactions) do allow for users to up/downvote notes with optional content (e.g., emojis) and could work for Attestations, but I think we need something less ambiguous and more definitive.
‘This is true’ resonates more strongly than ‘I like this.’.
https://i.nostr.build/s8NIG2kXzUCLcoax.jpg
There are similar concepts in the Web 3 / Web 5 world such as Verified Credentials by tdb. However, Nostr is the Web 3 now and so wen Attestation NIP?
https://i.nostr.build/Cb047NWyHdJ7h5Ka.jpg
That said, I have seen @utxo has been exploring ‘smart contracts’ on nostr and Attestations may just be a relatively ‘dumb’ subset of the wider concept Nostr-native scripting combined with web-of-trust.
Proof of Place
Attestations handle the signalling of your truth, but what about the initial verification itself?
We already covered how this ultimately has to be derived from your social graph, but what if there was a way to help bootstrap this web-of-trust through the use of oracles? For those unfamiliar with oracles in the digital realm, they are simply trusted purveyors of truth.
Introducing Proof of Place, an out–of-band process where an oracle (such as BTC Map) would mail - yes physically mail- a shared secret to the address of the location being claimed in cyberspace. This shared secret would be locked to the public key (npub) making the claim, which, if unlocked, would prove that the associated private key (nsec) has physical access to the location in meatspace.
One way of doing this would be to mint a 1 sat cashu ecash token locked to the npub of the claimant and mail it to them. If they are able to redeem the token then they have cryptographically proven that they have physical access to the location.
Proof of Place is really nothing more than a weighted Attestation. In a web-of-trust Nostrverse, an oracle is simply a npub (say BTC Map) that you weigh heavily for its opinion on a given topic (say Places).
In the Bitcoin world, Proof of Work anchors digital scarcity in cyberspace to physical scarcity (energy and time) in meatspace and as @Gigi says in PoW is Essential:
"A failure to understand Proof of Work, is a failure to understand Bitcoin."
In the Nostrverse, Proof of Place helps bridge the digital and physical worlds.
@Gigi also observes in Memes vs The World that:
"In Bitcoin, the map is the territory. We can infer everything we care about by looking at the map alone."
https://i.nostr.build/dOnpxfI4u7EL2v4e.png
This isn’t true for Nostr.
In the Nostrverse, the map IS NOT the territory. However, Proof of Place enables us to send cryptographic drones down into the physical territory to help us interpret our digital maps. 🤯
Check-ins
Although not a draft NIP yet, @Arkinox has also been exploring the familiar concept of Foursquare-style Check-ins on Nostr (with kind 13811 notes).
For the uninitiated, Check-ins are simply notes that signal the publisher is at a given location. These locations could be Places (in the Nostr sense) or any other given digital representation of a location for that matter (such as OSM elements) if NIP-73 - External Content IDs are used.
Of course, not everyone will be a Check-in enjoyooor as the concept will not sit well with some people’s threat models and OpSec practices.
Bringing Check-ins to Nostr is possible (as @sebastix capably shows here), but they suffer the same authenticity issues as Places. Just because I say I'm at a given location doesn't mean that I am.
Back in the Web 2.0 days, Foursquare mitigated this by relying on the GPS position of the phone running their app, but this is of course spoofable.
How should we approach Check-in verifiability in the Nostrverse? Well, just like with Places, we can use Attestations and WoT. In the context of Check-ins, an Attestation from the identity (npub) of the Place being checked-in to would be a particularly strong signal. An NFC device could be placed in a coffee shop and attest to check-ins without requiring the owner to manually intervene - I’m sure @blackcoffee and @Ben Arc could hack something together over a weekend!
Check-ins could also be used as a signal for bonafide Place ownership over time.
Summary: Trust Your Bros
So, to recap, we have:
Places: Digital representations of physical locations on Nostr.
Check-ins: Users signalling their presence at a location.
Attestations: Verifiable social proofs used to confirm ownership or the truth of a claim.
You can visualise how these three concepts combine in the diagram below:
https://i.nostr.build/Uv2Jhx5BBfA51y0K.jpg
And, as always, top right trumps bottom left! We have:
Level 0 - Trust Me Bro: Anyone can check-in anywhere. The Place might not exist or might be impersonating the real place in meatspace. The person behind the npub may not have even been there at all.
Level 1 - Definitely Maybe Somewhere: This category covers the middle-ground of ‘Maybe at a Place’ and ‘Definitely Somewhere’. In these examples, you are either self-certifying that you have checked-in at an Attested Place or you are having others attest that you have checked-in at a Place that might not even exist IRL.
Level 2 - Trust Your Bros: An Attested Check-in at an Attested Place. Your individual level of trust would be a function of the number of Attestations and how you weigh them within your own social graph.
https://i.nostr.build/HtLAiJH1uQSTmdxf.jpg
Perhaps the gold standard (or should that be the Bitcoin standard?) would be a Check-in attested by the owner of the Place, which in itself was attested by BTC Map?
Or perhaps not. Ultimately, it’s the users responsibility to determine what they trust by forming their own perspective within the Nostrverse powered by web-of-trust algorithms they control. ‘Trust Me Bro’ or ‘Trust Your Bros’ - you decide.
As we navigate the frontier of cryptographic ownership and decentralised data, it’s up to us to find the balance between preserving the Open Data commons and embracing self-sovereign digital identities.
Thanks
With thanks to Arkinox, Avi, Ben Gunn, Kieran, Blackcoffee, Sebastix, Tomek, Calle, Short Fiat, Ben Weeks and Bitcoms for helping shape my thoughts and refine content, whether you know it or not!
-
@ 8cb60e21:5f2deaea
2024-09-03 22:26:25 -
@ 8cb60e21:5f2deaea
2024-09-03 22:26:25 -
@ 460c25e6:ef85065c
2024-10-15 12:49:55NIPs (Nostr Implementation Possibilities) are technical specifications that Nostr developers create to define how specific event types and tags are used. These can be written before or after the feature is implemented and often go through multiple revisions before becoming stable enough to matter. Once two or more clients fully implement the proposal, it is merged into the main repository. This process ensures that while new ideas are encouraged, they are also rigorously reviewed and tested.
There are generally two paths for NIPs: 1. New Ideas, when developers just have a hunch on a new solution and want to quickly write something up to gather feedback from the community. These are my favorite NIPs because they generally introduce a new way of thinking about a problem we are all having. And because they are not just a general solution, but a specific proposal, it allows us to see the entire picture in just a few paragraphs. Even though they are my favorite, they are quite "green" and usually spur 2-3 separate solutions in following PRs by different authors. 2. Existing implementations that need to explain what they are doing. These happen when a client is already running the code in production and simply wants to explain to the rest of the community how to generate and interpret the events the client is creating. These NIPs start much more stable than the former and allow for fewer changes, but because there is already an implementation available, it's a market-tested solution that might just need a few adjustments before others start implementing it.
Well-written specs ensure clarity, reduce ambiguity, and help developers implement the proposal consistently. The text should be VERY short, precise, prescriptive, and actionable by other devs. Start by introducing the new kind or tag in the first sentence and jump straight into a mockup of how the event looks like. The mockup should be self-explanatory and provide clues to what the remaining of the document will talk about. Some folks like to add long/verbose introductions, conclusions, and discussions of the reasons why the NIP is needed or why certain features are there. But those are largely unnecessary and are more appropriate to be placed in the body of the Pull Request descriptor.
Start your NIP with the following template:
``` NIP-
====== draft
optional
Event kind
defines . Tags . As an example: `jsonc { "kind": <your kind>, "tags": [ <your tags> ], "content": "", //... }
`Relays MUST...
Clients MUST...
```
Your number for the NIP is irrelevant. Just pick a random number that is available so that you can fork the repo, create a file with that name, and start writing. This number will likely change once the NIP is merged.
The NIPs title must be self-explanatory and short. If it helps, try to imagine which name would be best to add to the list of NIPs on the readme.md file. Same for event type names. Picture something that is short, unique and that devs can just remove the space to have a class name.
The
draft
optional
tags are there because unless you are working on NIP-01, everything is draft and everything is optional. If you want to write a mandatory NIP, you better make sure your text is so good that it can be added to01.md
directly without overcomplicating the protocol.Start by describing the new event type, what it does and its main tags. Show the mockup and then start introducing all the other tags and how clients and relays should behave when implementing it. Use the words MUST, SHOULD, MAY, SHOULD NOT, and MUST NOT to define the mandatory behaviors of those declaring compliance with the NIP.
Keep it simple. The specification should be designed to ensure that different clients, relays, and services can implement it without requiring substantial changes to their existing infrastructure. Ideally, devs should be able to implement the entire NIP from near scratch in just a few hours. Don't use jargon. Don't declare a vocabulary of words. Use simple words that anyone can understand and quickly code a demo of all the features in the NIP. They can learn about your reasons as they develop their implementation.
Write expecting buggy implementations. The protocol must be resilient to varying implementations and network conditions, and gracefully handle coding errors or random gibberish. You want to promote a defensive design that anticipates misguided implementations, avoids breaking changes, and maximizes compatibility across the ecosystem. What happens if there are two tags with the same name? What happens if events that have missing tags are found? Buggy implementations will exist. The writing and reading clients are generally different and must be ready for anything that shows up on each side.
Avoid abstractions, extensible and modular designs. Yes, they can be hidden underneath your text, but writing for them is a mistake and just overcomplicates things. Write for a specific use case and close all possible options to the items/features declared in the text. Make sure you are implementing those. There is no point in declaring things that are not going to be used in the short term. We can always add more in the future and we don't need a recipe on how to add more later.
Label your relay hosts, setting kinds, and other data management necessities. Every NIP has a way to find out the user's preferred relay associated with the use case. Sometimes it's through a relay hint others through a separate event kind that just lists the user's home relays or contains a list of "following" events designed for the use case. Each NIP can create their own way of finding events.
You cannot add new root fields. Use tags instead. Root fields are special and require changes to the core protocol everyone implements. Any new field will take years to come to reality.
Once you propose an idea, try not to change too much. It will take time for other devs to wrap their minds around it. If you keep changing it, even if those changes reflect the request of the reviewers in the PR, it just confuses everyone. Sometimes things change so much that it is worth doing two PRs with separate specifications that solve the same problem. That allows devs to analyze the two propositions side by side and decide which one is better.
Always add a test case or an example. This is an absolute requirement if the NIP is complex, like a new encryption scheme. But even for simpler NIPs, test cases help devs to quickly verify if their implementations meet the minimum standard for compliance. They not only add peace of mind, but they also provide some welcoming dopamine when a new dev is trying to implement your NIP.
Managing state is hard. Doing it with different implementations and hosting them in separate relays is even harder. If your NIP has multiple events to manage state, like group administration actions (add/remove member, change names/icons, invite/reporting events) try to structure them in a way that devs can quickly see the state machine of all possible state changes.
Specify data formats explicitly. Clearly define the format of all data fields, including type (e.g., string, integer), encoding (e.g., base64, hex), and structure (e.g., array, object). Specify constraints like length limits, valid characters, and optional/required fields. Tags are case-sensitive. Avoid having to specify new encodings, but if you do, make sure to include test cases that encompass all potential cases.
It's ok to not propose the most efficient way of solving the problem. A simple but slightly less efficient design is preferred over a complex but more efficient one. We already use hex and base64 codes to represent binary bytes in JSON, which wastes 25-50% of space. That level of waste is ok if the solution becomes simpler to code.
It's not about you. You may think you must convince everyone that your particular way of solving the problem is the best and get some ego points with yourself. While some of that is beneficial to the debate, be open-minded to the other possible solutions. Once merged, the NIP is not yours anymore. Anyone can change in any way they see fit. If your work is great, people will remember your name. If it just got the conversation started to become something completely different from what you proposed, they will also remember you.
-
@ 3bf0c63f:aefa459d
2024-09-06 12:49:46Nostr: a quick introduction, attempt #2
Nostr doesn't subscribe to any ideals of "free speech" as these belong to the realm of politics and assume a big powerful government that enforces a common ruleupon everybody else.
Nostr instead is much simpler, it simply says that servers are private property and establishes a generalized framework for people to connect to all these servers, creating a true free market in the process. In other words, Nostr is the public road that each market participant can use to build their own store or visit others and use their services.
(Of course a road is never truly public, in normal cases it's ran by the government, in this case it relies upon the previous existence of the internet with all its quirks and chaos plus a hand of government control, but none of that matters for this explanation).
More concretely speaking, Nostr is just a set of definitions of the formats of the data that can be passed between participants and their expected order, i.e. messages between clients (i.e. the program that runs on a user computer) and relays (i.e. the program that runs on a publicly accessible computer, a "server", generally with a domain-name associated) over a type of TCP connection (WebSocket) with cryptographic signatures. This is what is called a "protocol" in this context, and upon that simple base multiple kinds of sub-protocols can be added, like a protocol for "public-square style microblogging", "semi-closed group chat" or, I don't know, "recipe sharing and feedback".
-
@ 7460b7fd:4fc4e74b
2024-09-05 08:37:48请看2014年王兴的一场思维碰撞,视频27分钟开始
最后,一个当时无法解决的点:丢失
-
@ f240c9c2:6c0c0a86
2024-08-22 06:50:33⚠️一部のクライアントでは表示が崩れている場合があります。HablaやYakihonneから見てください
NIP-51のkind:30007に関するPull Requestが承認され、2024/08/20時点で本家NIPsにもマージされました。今後「リポスト」や「リアクション」などの特定のkind^1をミュートするためのセット^2が対応するクライアントで使えるようになります。
kind mute set(kind:30007)にて、
"d"
タグには対応するイベントの種類の番号(リポストなら"6"
、リアクションなら"7"
)を入れ、"p"
タグにはユーザの公開鍵(pubkey)を入れるそうです。nostrクライアントのnostterは、これに対応したことで、Twitter(現:X)の「リポストをオフのする」機能のように"特定ユーザーのリポストをクライアント上で非表示にする"といったことができるようになりました。リアクションも同様に非表示にできます。 nostterでは、2024/07/29以降、ユーザーのプロフィール画面からこれらの設定を行えるようになっています。
2024/06/22 20時の時点では、nostter上ではこれを設定する画面が用意されていなかったので、別アプリを用いたり、イベントを自分で投げるなどして別途設定する必要がありました。 以下は、別アプリを用いて設定した際の手順です。
手順
kind:30007はのすとびうあというWebアプリで設定しました。 以下のようにのすとびうあのホーム画面「リストの種類」で30007を入力するか、
https://nostviewstr.vercel.app/<npub文字列>/30007
にアクセスして設定画面にいけました^3。左下の方にある≡を押して
ポップアップの「編集」を押して
ここではリポストのミュートのため、IDの欄に対応するイベントの種類の番号である「6」を入れて
右下にある青いボタン押して
Userの欄にリポストをミュートするユーザーの公開鍵のnpub文字列を入れ、public(ミュート状況が公開される)あるいはprivate(非公開)のボタンを押したら
そのユーザーが追加されて設定完了!
この設定を行うことで、入力した公開鍵(ユーザー)のリポストをnostter上でもミュートできました🙌
リポストやリアクションがどのように表示されるかをユーザーがコントロールできると便利なので、今後いろんなクライアントで対応されればいいな〜と思います!
-
@ e88527b4:7ccf6efa
2024-08-30 12:12:39書いてみた。。
-
@ 4c96d763:80c3ee30
2024-08-19 16:26:43Changes
Rusty Russell (3):
- Makefile: fix missing dependencies on bolt11 headers.
- bolt11: update to latest version from CLN
- bolt11: remove unneeded fields.
William Casarin (1):
- ndb_filter_from_json
pushed to nostrdb:refs/heads/master
-
@ 8cb60e21:5f2deaea
2024-08-29 02:16:28 -
@ b60c3e76:c9d0f46e
2024-05-15 10:08:47KRIS menjamin semua golongan masyarakat mendapatkan perlakuan sama dari rumah sakit, baik pelayanan medis maupun nonmedis.
Demi memberikan peningkatan kualitas layanan kesehatan kepada masyarakat, pemerintah baru saja mengeluarkan Peraturan Presiden (Perpres) nomor 59 tahun 2024 tentang Jaminan Kesehatan. Melalui perpres itu, Presiden Joko Widodo (Jokowi) telah menghapus perbedaan kelas layanan 1, 2, dan 3 dalam Badan Penyelenggara Jaminan Sosial atau BPJS Kesehatan.
Layanan berbasis kelas itu diganti dengan KRIS (Kelas Rawat Inap Standar). Berkaitan dengan lahirnya Perpres 59/2024 tentang Perubahan Ketiga atas Perpres 82/2018 tentang Jaminan Kesehatan, Presiden Joko Widodo telah memerintahkan seluruh rumah sakit yang bekerja sama dengan BPJS Kesehatan melaksanakannya.
Kebijakan baru itu mulai berlaku per 8 Mei 2024 dan paling lambat 30 Juni 2025. Dalam jangka waktu tersebut, rumah sakit dapat menyelenggarakan sebagian atau seluruh pelayanan rawat inap berdasarkan KRIS sesuai dengan kemampuan rumah sakit.
Lantas apa yang menjadi pembeda dari sisi layanan dengan layanan rawat inap sesuai Perpres 59/2024? Dahulu sistem layanan rawat BPJS Kesehatan dibagi berdasarkan kelas yang dibagi masing-masing kelas 1, 2, dan 3. Namun, melalui perpres, layanan kepada masyarakat tidak dibedakan lagi.
Pelayanan rawat inap yang diatur dalam perpres itu--dikenal dengan nama KRIS—menjadi sistem baru yang digunakan dalam pelayanan rawat inap BPJS Kesehatan di rumah sakit-rumah sakit. Dengan KRIS, semua golongan masyarakat akan mendapatkan perlakuan yang sama dari rumah sakit, baik dalam hal pelayanan medis maupun nonmedis.
Dengan lahirnya Perpres 59/2024, tarif iuran BPJS Kesehatan pun juga akan berubah. Hanya saja, dalam Perpres itu belum dicantumkan secara rinci ihwal besar iuran yang baru. Besaran iuran baru BPJS Kesehatan itu sesuai rencana baru ditetapkan pada 1 Juli 2025.
“Penetapan manfaat, tarif, dan iuran sebagaimana dimaksud ditetapkan paling lambat tanggal 1 Juli 2025,” tulis aturan tersebut, dikutip Senin (13/5/2024).
Itu artinya, iuran BPJS Kesehatan saat ini masih sama seperti sebelumnya, yakni sesuai dengan kelas yang dipilih. Namun perpres itu tetap berlaku sembari menanti lahirnya peraturan lanjutan dari perpres tersebut.
Kesiapan Rumah Sakit
Berkaitan dengan lahirnya kebijakan layanan kesehatan tanpa dibedakan kelas lagi, Kementerian Kesehatan (Kemenkes) menegaskan mayoritas rumah sakit di Indonesia siap untuk menjalankan layanan KRIS untuk pasien BPJS Kesehatan.
Kesiapan itu diungkapkan oleh Dirjen Pelayanan Kesehatan Kemenkes Azhar Jaya. “Survei kesiapan RS terkait KRIS sudah dilakukan pada 2.988 rumah sakit dan yang sudah siap menjawab isian 12 kriteria ada sebanyak 2.233 rumah sakit,” ujar Azhar.
Sebagai informasi, KRIS adalah pengganti layanan Kelas 1, 2, dan 3 BPJS Kesehatan yang bertujuan untuk memberikan layanan kesehatan secara merata tanpa melihat besaran iurannya.
Melalui KRIS, rumah sakit perlu menyiapkan sarana dan prasarana sesuai dengan 12 kriteria kelas rawat inap standar secara bertahap. Apa saja ke-12 kriteria KRIS itu?
Sesuai bunyi Pasal 46A Perpres 59/2024, disyaratkan kriteria fasilitas perawatan dan pelayanan rawat inap KRIS meliputi komponen bangunan yang digunakan tidak boleh memiliki tingkat porositas yang tinggi serta terdapat ventilasi udara dan kelengkapan tidur.
Demikian pula soal pencahayaan ruangan. Perpres itu juga mengatur pencahayaan ruangan buatan mengikuti kriteria standar 250 lux untuk penerangan dan 50 lux untuk pencahayaan tidur, temperature ruangan 20--26 derajat celcius.
Tidak hanya itu, layanan rawat inap berdasarkan perpres itu mensyaratkan fasilitas layanan yang membagi ruang rawat berdasarkan jenis kelamin pasien, anak atau dewasa, serta penyakit infeksi atau noninfeksi.
Selain itu, kriteria lainnya adalah keharusan bagi penyedia layanan untuk mempertimbangkan kepadatan ruang rawat dan kualitas tempat tidur, penyediaan tirai atau partisi antartempat tidur, kamar mandi dalam ruangan rawat inap yang memenuhi standar aksesibilitas, dan menyediakan outlet oksigen.
Selain itu, kelengkapan tempat tidur berupa adanya dua kotak kontak dan nurse call pada setiap tempat tidur dan adanya nakas per tempat tidur. Kepadatan ruang rawat inap maksimal empat tempat tidur dengan jarak antara tepi tempat tidur minimal 1,5 meter.
Tirai/partisi dengan rel dibenamkan menempel di plafon atau menggantung. Kamar mandi dalam ruang rawat inap serta kamar mandi sesuai dengan standar aksesibilitas dan outlet oksigen.
Azhar menjamin, Kemenkes akan menjalankan hal tersebut sesuai dengan tupoksi yang ada. “Tentu saja kami akan bekerja sama dengan BPJS Kesehatan dalam implementasi dan pengawasannya di lapangan,” ujar Azhar.
Berkaitan dengan perpres jaminan kesehatan itu, Direktur Utama BPJS Kesehatan Ghufron Mukti menilai, perpres tersebut berorientasi pada penyeragaman kelas rawat inap yang mengacu pada 12 kriteria. "Bahwa perawatan ada kelas rawat inap standar dengan 12 kriteria, untuk peserta BPJS, maka sebagaimana sumpah dokter tidak boleh dibedakan pemberian pelayan medis atas dasar suku, agama, status sosial atau beda iurannya," ujarnya.
Jika ada peserta ingin dirawat pada kelas yang lebih tinggi, kata Ghufron, maka diperbolehkan selama hal itu dipengaruhi situasi nonmedis. Hal itu disebutkan dalam Pasal 51 Perpres Jaminan Kesehatan diatur ketentuan naik kelas perawatan.
Menurut pasal tersebut, naik kelas perawatan dilakukan dengan cara mengikuti asuransi kesehatan tambahan atau membayar selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya yang harus dibayar akibat peningkatan pelayanan.
Selisih antara biaya yang dijamin oleh BPJS Kesehatan dengan biaya pelayanan dapat dibayar oleh peserta bersangkutan, pemberi kerja, atau asuransi kesehatan tambahan.
Ghufron Mukti juga mengimbau pengelola rumah sakit tidak mengurangi jumlah tempat tidur perawatan pasien dalam upaya memenuhi kriteria KRIS. "Pesan saya jangan dikurangi akses dengan mengurangi jumlah tempat tidur. Pertahankan jumlah tempat tidur dan penuhi persyaratannya dengan 12 kriteria tersebut," tegas Ghufron.
Penulis: Firman Hidranto Redaktur: Ratna Nuraini/Elvira Inda Sari Sumber: Indonesia.go.id
-
@ e968e50b:db2a803a
2024-10-18 15:37:15I played at the "Freedom Stage" last night, which I think was ironically paid for by Fifth Third Bank. Anyway, I wore my freedom hat.
I was wringing my hands the whole time about whether or not to put a bitcoin.rocks sticker on the plaque for that piece of the Berlin wall. In the end, I don't think that's the hill I want to die on. I'd rather get thrown in prison for helping some overseas political dissenter with my node.
I'm back at this festival on Saturday and am going to bring some cashus to distribute.
originally posted at https://stacker.news/items/729732
-
@ 8cb60e21:5f2deaea
2024-08-28 01:53:35 -
@ 266815e0:6cd408a5
2024-05-09 17:23:28Lot of people are starting to talk about building a web-of-trust and how nostr can or is already being used as such
We all know about using the kind:3 following lists as a simple WoT that can be used to filter out spam. but as we all know it does not really signal "trust", its mostly just "I find your content interesting"
But what about real "trust"... well its kind of multi-denominational, I could trust that your a good developer or a good journalist but still not trust you enough to invite you over to my house. There are some interesting and clever solutions proposed for quantifying "trust" in a digital sense but I'm not going to get into that here. I want to talk about something that I have not see anyone discuss yet.
How is the web-of-trust maintained? or more precisely how do you expect users to update the digital representation of the "trust" of other users?
Its all well and good to think of how a user would create that "trust" of another user when discovering them for the first time. They would click the "follow" button, or maybe even rate them on a few topics with a 1/5 star system But how will a user remove that trust? how will they update it if things change and they trust them less?
If our goal is to model "trust" in a digital sense then we NEED a way for the data to stay up-to-date and as accurate as possible. otherwise whats the use? If we don't have a friction-less way to update or remove the digital representation of "trust" then we will end up with a WoT that continuously grows and everyone is rated 10/10
In the case of nostr kind:3 following lists. its pretty easy to see how these would get updated. If someone posts something I dislike or I notice I'm getting board of their content. then I just unfollow them. An important part here is that I'm not thinking "I should update my trust score of this user" but instead "I'm no longer interested, I don't want to see this anymore"
But that is probably the easiest "trust" to update. because most of us on social media spend some time curating our feed and we are used to doing it. But what about the more obscure "trust" scores? whats the regular mechanism by which a user would update the "honestly" score of another user?
In the real world its easy, when I stop trusting someone I simply stop associating with them. there isn't any button or switch I need to update. I simply don't talk to them anymore, its friction-less But in the digital realm I would have to remove or update that trust. in other words its an action I need to take instead of an action I'm not doing. and actions take energy.
So how do we reflect something in the digital world that takes no-energy and is almost subconscious in the real world?
TLDR; webs-of-trust are not just about scoring other users once. you must keep the score up-to-date
-
@ 27676f17:0726572a
2024-06-21 23:13:04foobar
-
@ b83a28b7:35919450
2024-08-27 16:48:28https://image.nostr.build/df0721d6d45d82db35d06663a0318ffe68c0b2b3c694888d23694efcc4255de5.gif
-
@ e968e50b:db2a803a
2024-10-18 15:26:12Here's a link to the original post. After watching stacker news live from that week, I took @bitcoinplebdev and @k00b's advise and added a QR code to cashu.me on the ticket. The nutcracker doesn't actually need to sign into a mint on entry, so this should be a pretty quick onboarding process.
These nuts have all been cracked, by the way. Just trying to save you some time.
The next step is to get some nice stationary paper. This is gonna be a killer Halloween. Here's the repo if anybody else wants to pass these out: https://github.com/ttooccooll/snickerbar.me
originally posted at https://stacker.news/items/729712
-
@ 266815e0:6cd408a5
2024-04-22 22:20:47While I was in Mediera with all the other awesome people at the first SEC cohort there where a lot of discussions around data storage on nostr and if it could be made censorship-resistent
I remember lots of discussions about torrents, hypercore, nostr relays, and of course IPFS
There were a few things I learned from all these conversations:
- All the existing solutions have one thing in common. A universal ID of some kind for files
- HTTP is still good. we don't have to throw the baby out with the bath water
- nostr could fix this... somehow
Some of the existing solutions work well for large files, and all of them are decentralization in some way. However none of them seem capable of serving up cat pictures for social media clients. they all have something missing...
An Identity system
An identity system would allow files to be "owned" by users. and once files have owners servers could start grouping files into a single thing instead of a 1000+ loose files
This can also greatly simplify the question of "what is spam" for a server hosting (or seeding) these files. since it could simply have a whitelist of owners (and maybe their friends)
What is blossom?
Blossom is a set of HTTP endpoints that allow nostr users to store and retrieve binary data on public servers using the sha256 hash as a universal id
What are Blobs?
blobs are chunks of binary data. they are similar to files but with one key difference, they don't have names
Instead blobs have a sha256 hash (like
b1674191a88ec5cdd733e4240a81803105dc412d6c6708d53ab94fc248f4f553
) as an IDThese IDs are universal since they can be computed from the file itself using the sha256 hashing algorithm ( you can get a files sha256 hash on linux using:
sha256sum bitcoin.pdf
)How do the servers work?
Blossom servers expose four endpoints to let clients and users upload and manage blobs
GET /<sha256>
(optional file.ext
)PUT /upload
Authentication
: Signed nostr event- Returns a blob descriptor
GET /list/<pubkey>
- Returns an array of blob descriptors
Authentication
(optional): Signed nostr eventDELETE /<sha256>
Authentication
: Signed nostr event
What is Blossom Drive?
Blossom Drive is a nostr app built on top of blossom servers and allows users to create and manage folders of blobs
What are Drives
Drives are just nostr events (kind
30563
) that store a map of blobs and what filename they should have along with some extra metadataAn example drive event would be
json { "pubkey": "266815e0c9210dfa324c6cba3573b14bee49da4209a9456f9484e5106cd408a5", "created_at": 1710773987, "content": "", "kind": 30563, "tags": [ [ "name", "Emojis" ], [ "description", "nostr emojis" ], [ "d", "emojis" ], [ "r", "https://cdn.hzrd149.com/" ], [ "x", "303f018e613f29e3e43264529903b7c8c84debbd475f89368cb293ec23938981", "/noStrudel.png", "15161", "image/png" ], [ "x", "a0e2b39975c8da1702374b3eed6f4c6c7333e6ae0008dadafe93bd34bfb2ca78", "/satellite.png", "6853", "image/png" ], [ "x", "e8f3fae0f4a43a88eae235a8b79794d72e8f14b0e103a0fed1e073d8fb53d51f", "/amethyst.png", "20487", "image/png" ], [ "x", "70bd5836807b916d79e9c4e67e8b07e3e3b53f4acbb95c7521b11039a3c975c6", "/nos.png", "36521", "image/png" ], [ "x", "0fc304630279e0c5ab2da9c2769e3a3178c47b8609b447a30916244e89abbc52", "/primal.png", "29343", "image/png" ], [ "x", "9a03824a73d4af192d893329bbc04cd3798542ee87af15051aaf9376b74b25d4", "/coracle.png", "18300", "image/png" ], [ "x", "accdc0cdc048f4719bb5e1da4ff4c6ffc1a4dbb7cf3afbd19b86940c01111568", "/iris.png", "24070", "image/png" ], [ "x", "2e740f2514d6188e350d95cf4756bbf455d2f95e6a09bc64e94f5031bc4bba8f", "/damus.png", "32758", "image/png" ], [ "x", "2e019f08da0c75fb9c40d81947e511c8f0554763bffb6d23a7b9b8c9e8c84abb", "/old emojis/astral.png", "29365", "image/png" ], [ "x", "d97f842f2511ce0491fe0de208c6135b762f494a48da59926ce15acfdb6ac17e", "/other/rabbit.png", "19803", "image/png" ], [ "x", "72cb99b689b4cfe1a9fb6937f779f3f9c65094bf0e6ac72a8f8261efa96653f5", "/blossom.png", "4393", "image/png" ] ] }
There is a lot going on but the main thing is the list of "x" tags and the path that describes the folder and filename the blob should live at
If your interested, the full event definition is at github.com/hzrd149/blossom-drive
Getting started
Like every good nostr client it takes a small instruction manual in order to use it properly. so here are the steps for getting started
1. Open the app
Open https://blossom.hzrd149.com
2. Login using extension
You can also login using any of the following methods using the input - NIP-46 with your https://nsec.app or https://flare.pub account - a NIP-46 connection string - an
ncryptsec
password protected private key - ansec
unprotected private key (please don't) - bunker:// URI from nsecbunker3. Add a blossom server
Right now
https://cdn.satellite.earth
is the only public server that is compatible with blossom drive. If you want to host your own I've written a basic implementation in TypeScript github.com/hzrd149/blossom-server4. Start uploading your files
NOTE: All files upload to blossom drive are public by default. DO NOT upload private files
5. Manage files
Encrypted drives
There is also the option to encrypt drives using NIP-49 password encryption. although its not tested at all so don't trust it, verify
Whats next?
I don't know, but Im excited to see what everyone else on nostr builds with this. I'm only one developer at the end of the day and I can't think of everything
also all the images in this article are stored in one of my blossom drives here
nostr:naddr1qvzqqqrhvvpzqfngzhsvjggdlgeycm96x4emzjlwf8dyyzdfg4hefp89zpkdgz99qq8xzun5d93kcefdd9kkzem9wvr46jka
-
@ 8cb60e21:5f2deaea
2024-08-25 20:26:43 -
@ 5d4b6c8d:8a1c1ee3
2024-10-18 14:53:14It's been one year since I began my campaign to get stackers to zap more: https://stacker.news/items/287074/r/Undisciplined.
I've made several such appeals based on how zapping benefits the zapper indirectly by supporting the territories they like (https://stacker.news/items/614066/r/Undisciplined ), rewarding the kind of content and behavior they want to see (https://stacker.news/items/523858/r/Undisciplined), and reducing spam (https://stacker.news/items/621288/r/Undisciplined).
I also described how incentive problems in the reward system might lead to pathological zapping behavior (https://stacker.news/items/473181/r/Undisciplined) and why it's not in Stackers' best interest to game the rewards system (https://stacker.news/items/546904/r/Undisciplined).
Zapping More to Reduce Gaming of the Leader Board
There have been a few instances of people clearly gaming the rewards system by correctly predicting which posts will become top posts and zapping them very shortly after they've been posted (clearly too quickly to have actually read the post). I'm not particularly bothered by this, but I know some stackers are.
What these gamers are doing is exploiting an inefficiency in how the rest of us are behaving. In previous discussions about this, I made the point that this behavior is self-correcting. That was based on basic econ logic about profits tending to zero when there are no barriers to entry (basically, someone else will try to zap posts immediately, too, and the gamers will cannibalize themselves).
One way to resolve that inefficiency is to zap faster, but another is to zap more. Zapping faster may not be feasible if you actually want to read posts before zapping them (although you can sort on recent if you're not already doing that to catch posts earlier). However, as I've been harping on for a year now, zapping more is often in the Stacker's own interest anyway.
The reason these gamers are able to fly up the leader board with relatively few sats zapped is because they're getting to the top of the "top post zapper" rankings. The leader board rankings are based on where stackers rank in four separate categories: top posts, top comments, zapping top posts, and zapping top comments. It is also non-linear: i.e. the difference between 1st and 2nd in a category is greater than the difference between 5th and 6th. The gamers are essentially ranking 1st in one category and last in all the others, but that's sufficient to make it high up the leader board and reap significant rewards.
The threshold for ranking 1st in zapping top posts would be higher if the rest of us were zapping top posts more (and zapping them quicker). At the very least, that would mean those trying to game the system would also have to zap more to hold onto their place, which would mean more rewards for the rest of and less net benefit for them.
TL;DR
If you don't like seeing people gaming the leader board, zapping more will make it harder for them, while getting more sats to the creators you like and netting you some more rewards. It's win-win-lose, but you don't like the loser.
originally posted at https://stacker.news/items/729620
-
@ 3f770d65:7a745b24
2024-06-17 18:56:54Several months ago, nostr:npub1hqaz3dlyuhfqhktqchawke39l92jj9nt30dsgh2zvd9z7dv3j3gqpkt56s and I set out to do tackle a task that had never been done before throughout Nostr's short history. We decided adopt the "go big, or go home" mentality and give our best effort to Purple Pill all of the nostr:npub167n5w6cj2wseqtmk26zllc7n28uv9c4vw28k2kht206vnghe5a7stgzu3r conference.
We couldn't accomplish this monumental task without the help of the Nostr community. From every day Nostriches and plebs, to legendary developers putting their blood, sweat, and tears into building this new protocol, to several companies within the Nostr ecosystem, everyone was going to need to do their part to turn this dream into a reality.
The mission
For the original vision of Nostr at BTC Prague, we planned on supporting the smallest available booth and a small panel on the secondary stage. The plan was for any Nostr developer to contribute what they could and then use the Nostr booth as a central hub to onboard users to their applications, provide support to their users, and meet the community. I embarked on my first crowdfunding journey and was able to initially raise over 10M sats thanks to the greater Nostr community donating towards our efforts.
Shortly afterwards, I was approached by nostr:npub1dtgg8yk3h23ldlm6jsy79tz723p4sun9mz62tqwxqe7c363szkzqm8up6m from Satlantis. He had planned on doing a mainstage presentation at BTC Prague on his new Nostr powered application. He asked me if I wanted to combine our efforts to upgrade the Nostr booth to the largest booth possible to give Nostr an even larger presence. I reached out to Avi and several other trusted Nostriches to see their opinions on this potential upgrade and everyone seemed to agree that we should continue with the "go big, or go home" mentality and try our best to Purple Pill all of Prague.
Now with a larger goal at hand, we were able to garner even more support from the Nostr community in addition by adding Highlighter from nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft and Primal from nostr:npub16c0nh3dnadzqpm76uctf5hqhe2lny344zsmpm6feee9p5rdxaa9q586nvr as larger contributors.
The final tallies for funds raised were 16M+ sats from the greater Nostr community and 38M+ sats raised from Satlantis, Primal, and Highlighter. (We did have to raise a little more than originally anticipated because the Bitcoin 58K Gang made the fiat value of Bitcoin dip down for a bit right when we were trying to finalize payment.)
Putting it all together
This support enabled us to secure one of the four large booths at BTC Prague and a main stage panel. Given that these three companies made significant contributions, enabling our acquisition of the largest booth, we decided that it was logical to feature these companies more prominently. However, it was crucial to strike a delicate balance here. While emphasizing that this booth represented the Nostr community and was a true community effort, we also wanted to acknowledge and showcase those who made it possible. These companies could have opted for smaller individual booths, but their collaboration in a unified space demonstrates Nostr's principles of openness and interoperability—demonstrating that everyone and everything can work together seamlessly.
Therefore, we included as many logos across the Nostr ecosystem as possible throughout our iconography.
And, we also had a dedicated area of the booth highlighting our larger contributors.
The results exceeded all expectations. For three days during the BTC Prague conference, the Nostr booth was continuously bustling with activity. Attendees ranged from individuals who had never heard of Nostr before to those who were curious, active users within the ecosystem, and developers creating the applications we use daily. It was a remarkable community effort, with unexpected volunteers stepping up to onboard new users and provide support. Recognizing our busy schedules and flocks of new Nostriches hatching, they chose to assist in our efforts, offering help, and answering questions. It was a truly inspiring experience. Despite the busyness, the enthusiasm and support of so many people made each day enjoyable and dynamic, ensuring there was never a dull moment and we were always surrounded by friends.
Booth takeaways
As this was our very first attempt at doing something like this, I'd like to do a personal post mortem and highlight many of our successes and even some areas where I feel we can improve upon in the future.
Several Nostriches went above and beyond, helping onboard people and answer questions for three days straight. nostr:npub17plqkxhsv66g8quxxc9p5t9mxazzn20m426exqnl8lxnh5a4cdns7jezx0 nostr:npub1spdnfacgsd7lk0nlqkq443tkq4jx9z6c6ksvaquuewmw7d3qltpslcq6j7 nostr:npub1v0lxxxxutpvrelsksy8cdhgfux9l6a42hsj2qzquu2zk7vc9qnkszrqj49 nostr:npub1k6tqlj78cpznd0yc74wy3k0elmj4nql87a3uzfz98tmj3tuzxywsf0dhk6 nostr:npub1md39ua3h2s7204a7v5p9sdxmxx9qc7m4kr3r6naeuwfznad6d7nsxpctp9 nostr:npub1arkn0xxxll4llgy9qxkrncn3vc4l69s0dz8ef3zadykcwe7ax3dqrrh43w nostr:npub1zga04e73s7ard4kaektaha9vckdwll3y8auztyhl3uj764ua7vrqc7ppvc were the lifeblood of the booth, always answering questions themselves or referring them to others if they were unable to help, didn't know the answer or were busy at the time. You all put in the work and deserve much credit and thanks. Even nostr:npub1995y964wmxl94crx3ksfley24szjr390skdd237ex9z7ttp5c9lqld8vtf was helping with onboarding!
Additionally, beyond general use case questions, we also had many developers stop by and answer many more technical questions for those wanting to learn a bit more too. nostr:npub1zach44xjpc4yyhx6pgse2cj2pf98838kja03dv2e8ly8lfr094vqvm5dy5 nostr:npub1v0lxxxxutpvrelsksy8cdhgfux9l6a42hsj2qzquu2zk7vc9qnkszrqj49 nostr:npub1arkn0xxxll4llgy9qxkrncn3vc4l69s0dz8ef3zadykcwe7ax3dqrrh43w nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft were often seen answering more technical questions on various developmental topics.
Identifying areas for improvement is challenging, as the entire team of Nostriches performed exceptionally well, exceeding expectations. The event was a whirlwind of activity, with constant engagement and zero downtime. Volunteers seamlessly rotated at the front counter answering questions and distributing items to attendees. (Thanks nostr:npub1cgcwm56v5hyrrzl5ty4vq4kdud63n5u4czgycdl2r3jshzk55ufqe52ndy . Your nostr.how and nostrapps.com business cards were a HUGE help here!)
Full disclosure, I personally didn't leave the booth for three days all that much for two reasons. 1) Because I love to #GrowNostr and talk to people and 2) Because I was worried that the booth would turn into a corporate Primal or Satlantis show. However, this wasn't the case. While these teams did have a large presence with many team members all wearing t-shirts, none of my fears became a reality. If people asked questions about Nostr in general, that was discussed. If people asked questions about Primal or Satlantis, that was discussed. I personally recommended numerous social apps, Damus, Amethyst, Primal, Nostur, Nos.social - all of them. The booth was a true decentralized effort and I absolutely did not need to worry as much as I did, but I felt like I had an obligation to fulfill and I wanted to be there to see it through.
If I had to choose an area that needed improvement, I'd say that the three Satlantis women that nostr:npub1dtgg8yk3h23ldlm6jsy79tz723p4sun9mz62tqwxqe7c363szkzqm8up6m brought with him were supposed to shadow some of us to learn more about Nostr, so that they could then use this information to do the initial intake booth questions before making the referral to those with more information, but this just didn't happen. We were all so busy. Sorry! It was just too hard to coordinate. Maybe in the future we can prepare a bit more in this area. Although, nostr:npub1hz5alqscpp8yjrvgsdp2n4ygkl8slvstrgvmjca7e45w6644ew7sewtysa did a fantastic job, jumping right in there head first!
Secondly, we could have improved our television capabilities. We rotated from showing the live dashboard from the booth's Zap.stream livestream, to showing Primal.net/explore Nostr statistics, to showing nostr:npub1lelkh3hhxw9hdwlcpk6q9t0xt9f7yze0y0nxazvzqjmre3p98x3sthkvyz 's Nostr Documentary on loop, to playing the Satlantis promotional video. The majority of the time our TV was playing the same Nostr Documentary. It's great! I love that video, but we may be able to work out a better schedule and rotation mechanism in the future to showcase more content equally. Plus, I don't want to always be on the TV. I don't want people getting the wrong idea.
Nostr takeaways
After speaking with hundreds of people at BTC Prague, I feel that I've discovered the best way to describe Nostr.
Nostr has a portable digital social identity, allowing you to be in control of your digital social identity for the very first time, allowing you to take your entire social graph with you, every time you use a different application from Nostr's ecosystem.
Nostr is the social glue that binds all of your apps together.
In general, at BTC Prague, while explaining Nostr to people, the digital social identity route was what clicked with the most people. From there, it's not a long stretch to understand building a reputation and web of trust either.
Many people do not use the "Other Stuff" and explaining to them how to use these applications is hard. People want a native application.
Damus, Primal, and Amethyst seem to be the number one apps that people are using, with maybe Primal being the number one altogether? This is probably due to Primal being available on Android, iOS, and the web. Also, many people don't know that Damus still supports Zaps via the Nostr script workaround. I had to show many how to enable Zaps.
Everyone wants Nostr at their conference
There is significant interest in featuring Nostr at various conferences. Although not everyone has reached out, numerous individuals at BTC Prague expressed enthusiasm about incorporating a Nostr booth, along with several Nostr talks and sessions, into their upcoming events. They recognize the critical role Nostr and free speech play globally and acknowledge Nostr's popularity within the Bitcoin community. However, they also understand that more work is needed, and we must continue our efforts to onboard and engage new users.
I have two primary observations on this matter:
-
The community effort demonstrated here serves as a blueprint for success. We have proven that this approach to growing Nostr is effective, desired, and necessary. The engagement at our booth and attendance at our panels prove this with ease.
-
This fundraising initiative is likely a one-time effort. I cannot, in good conscience, continue to ask the community to bootstrap these endeavors. If we are to sustain these booths and promote Nostr at similar conferences, the conference organizers themselves must provide substantial support or discounts to foster broader Nostr adoption. While I understand that conferences entail significant operational costs, it is not feasible for Nostr developers and the broader Nostr community to finance these efforts continuously. Additionally, I would not feel comfortable requesting financial contributions from you all again for this purpose.
Looking forward
Will we do _this _again? I don't know. While our initial endeavor was a complete success, it would be unfortunate to cease our efforts just as we are gaining momentum.
Avi and I have a lot to discuss between ourselves and a lot to discuss with all of you.
Thank you all from the bottom of my heart. Thank you nostr:npub1dtgg8yk3h23ldlm6jsy79tz723p4sun9mz62tqwxqe7c363szkzqm8up6m nostr:npub1l2vyh47mk2p0qlsku7hg0vn29faehy9hy34ygaclpn66ukqp3afqutajft nostr:npub16c0nh3dnadzqpm76uctf5hqhe2lny344zsmpm6feee9p5rdxaa9q586nvr for making all of this possible. Thank you to every single Nostrich that donated your hard earned sats to make this possible. Thank you to all of the developers that built all of this to make all of this possible. Thank you to everyone else <3
Keep building.
-
-
@ 8cb60e21:5f2deaea
2024-08-24 23:57:19asdasdasdsad
-
@ e968e50b:db2a803a
2024-10-18 13:40:28 -
@ f977c464:32fcbe00
2024-01-30 20:06:18Güneşin kaybolmasının üçüncü günü, saat öğlen on ikiyi yirmi geçiyordu. Trenin kalkmasına yaklaşık iki saat vardı. Hepimiz perondaydık. Valizlerimiz, kolilerimiz, renk renk ve biçimsiz çantalarımızla yan yana dizilmiş, kısa aralıklarla tepemizdeki devasa saati kontrol ediyorduk.
Ama ne kadar dik bakarsak bakalım zaman bir türlü istediğimiz hızla ilerlemiyordu. Herkes birkaç dakika sürmesi gereken alelade bir doğa olayına sıkışıp kalmış, karanlıktan sürünerek çıkmayı deniyordu.
Bekleme salonuna doğru döndüm. Nefesimden çıkan buharın arkasında, kalın taş duvarları ve camlarıyla morg kadar güvenli ve soğuk duruyordu. Cesetleri o yüzden bunun gibi yerlere taşımaya başlamışlardı. Demek insanların bütün iyiliği başkaları onları gördüğü içindi ki gündüzleri gecelerden daha karanlık olduğunda hemen birbirlerinin gırtlağına çökmüş, böğürlerinde delikler açmış, gözlerini oyup kafataslarını parçalamışlardı.
İstasyonun ışığı titrediğinde karanlığın enseme saplandığını hissettim. Eğer şimdi, böyle kalabalık bir yerde elektrik kesilse başımıza ne gelirdi?
İçerideki askerlerden biri bakışlarımı yakalayınca yeniden saate odaklanmış gibi yaptım. Sadece birkaç dakika geçmişti.
“Tarlalarım gitti. Böyle boyum kadar ayçiçeği doluydu. Ah, hepsi ölüp gidiyor. Afitap’ın çiçekleri de gi-”
“Dayı, Allah’ını seversen sus. Hepimizi yakacaksın şimdi.”
Karanlıkta durduğunda, görünmez olmayı istemeye başlıyordun. Kimse seni görmemeli, nefesini bile duymamalıydı. Kimsenin de ayağının altında dolaşmamalıydın; gelip kazayla sana çarpmamalılar, takılıp sendelememeliydiler. Yoksa aslında hedefi sen olmadığın bir öfke gürlemeye başlar, yaşadığın ilk şoku ve acıyı silerek üstünden geçerdi.
İlk konuşan, yaşlıca bir adam, kafasında kasketi, nasırlı ellerine hohluyordu. Gözleri ve burnu kızarmıştı. Güneşin kaybolması onun için kendi başına bir felaket değildi. Hayatına olan pratik yansımalarından korkuyordu olsa olsa. Bir anının kaybolması, bu yüzden çoktan kaybettiği birinin biraz daha eksilmesi. Hayatta kalmasını gerektiren sebepler azalırken, hayatta kalmasını sağlayacak kaynaklarını da kaybediyordu.
Onu susturan delikanlıysa atkısını bütün kafasına sarmış, sakalı ve yüzünün derinliklerine kaçmış gözleri dışında bedeninin bütün parçalarını gizlemeye çalışıyordu. İşte o, güneşin kaybolmasının tam olarak ne anlama geldiğini anlamamış olsa bile, dehşetini olduğu gibi hissedebilenlerdendi.
Güneşin onlardan alındıktan sonra kime verileceğini sormuyorlardı. En başta onlara verildiğinde de hiçbir soru sormamışlardı zaten.
İki saat ne zaman geçer?
Midemin üstünde, sağ tarafıma doğru keskin bir acı hissettim. Karaciğerim. Gözlerimi yumdum. Yanımda biri metal bir nesneyi yere bıraktı. Bir kafesti. İçerisindeki kartalın ıslak kokusu burnuma ulaşmadan önce bile biliyordum bunu.
“Yeniden mi?” diye sordu bana kartal. Kanatları kanlı. Zamanın her bir parçası tüylerinin üstüne çöreklenmişti. Gagası bir şey, tahminen et parçası geveliyor gibi hareket ediyordu. Eski anılar kolay unutulmazmış. Şu anda kafesinin kalın parmaklıklarının ardında olsa da bunun bir aldatmaca olduğunu bir tek ben biliyordum. Her an kanatlarını iki yana uzatıverebilir, hava bu hareketiyle dalgalanarak kafesi esneterek hepimizi içine alacak kadar genişleyebilir, parmaklıklar önce ayaklarımızın altına serilir gibi gözükebilir ama aslında hepimizin üstünde yükselerek tepemize çökebilirdi.
Aşağıya baktım. Tahtalarla zapt edilmiş, hiçbir yere gidemeyen ama her yere uzanan tren rayları. Atlayıp koşsam… Çantam çok ağırdı. Daha birkaç adım atamadan, kartal, suratını bedenime gömerdi.
“Bu sefer farklı,” diye yanıtladım onu. “Yeniden diyemezsin. Tekrarladığım bir şey değil bu. Hatta bir hata yapıyormuşum gibi tonlayamazsın da. Bu sefer, insanların hak etmediğini biliyorum.”
“O zaman daha vahim. Süzme salaksın demektir.”
“İnsanların hak etmemesi, insanlığın hak etmediği anlamına gelmez ki.”
Az önce göz göze geldiğim genççe ama çökük asker hâlâ bana bakıyordu. Bir kartalla konuştuğumu anlamamıştı şüphesiz. Yanımdakilerden biriyle konuştuğumu sanmış olmalıydı. Ama konuştuğum kişiye bakmıyordum ona göre. Çekingence kafamı eğmiştim. Bir kez daha göz göze geldiğimizde içerideki diğer iki askere bir şeyler söyledi, onlar dönüp beni süzerken dışarı çıktı.
Yanımızdaki, az önce konuşan iki adam da şaşkınlıkla bir bana bir kartala bakıyordu.
“Yalnız bu sefer kalbin de kırılacak, Prometheus,” dedi kartal, bana. “Belki son olur. Biliyorsun, bir sürü soruna neden oluyor bu yaptıkların.”
Beni koruyordu sözde. En çok kanıma dokunan buydu. Kasıklarımın üstüne oturmuş, kanlı suratının ardında gözleri parlarken attığı çığlık kulaklarımda titremeye devam ediyordu. Bu tabloda kimsenin kimseyi düşündüğü yoktu. Kartalın, yanımızdaki adamların, artık arkama kadar gelmiş olması gereken askerin, tren raylarının, geçmeyen saatlerin…
Arkamı döndüğümde, asker sahiden oradaydı. Zaten öyle olması gerekiyordu; görmüştüm bunu, biliyordum. Kehanetler… Bir şeyler söylüyordu ama ağzı oynarken sesi çıkmıyordu. Yavaşlamış, kendisini saatin akışına uydurmuştu. Havada donan tükürüğünden anlaşılıyordu, sinirliydi. Korktuğu için olduğunu biliyordum. Her seferinde korkmuşlardı. Beni unutmuş olmaları işlerini kolaylaştırmıyordu. Sadece yeni bir isim vermelerine neden oluyordu. Bu seferkiyle beni lanetleyecekleri kesinleşmişti.
Olması gerekenle olanların farklı olması ne kadar acınasıydı. Olması gerekenlerin doğasının kötücül olmasıysa bir yerde buna dayanıyordu.
“Salaksın,” dedi kartal bana. Zamanı aşan bir çığlık. Hepimizin önüne geçmişti ama kimseyi durduramıyordu.
Sonsuzluğa kaç tane iki saat sıkıştırabilirsiniz?
Ben bir tane bile sıkıştıramadım.
Çantama uzanıyordum. Asker de sırtındaki tüfeğini indiriyordu. Benim acelem yoktu, onunsa eli ayağı birbirine dolaşıyordu. Oysaki her şey tam olması gerektiği anda olacaktı. Kehanet başkasının parmaklarının ucundaydı.
Güneş, bir tüfeğin patlamasıyla yeryüzüne doğdu.
Rayların üzerine serilmiş göğsümün ortasından, bir çantanın içinden.
Not: Bu öykü ilk olarak 2021 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8cb60e21:5f2deaea
2024-08-24 23:54:44 -
@ acc925af:db9fb0bb
2024-10-18 13:20:14SUMMARY
"LNHANCE.ORG", launched to show the LNhance proposal by Brandon Black (Reardencode) and 4moonsettler, which aims to improve Bitcoin's scalability, privacy, and flexibility by introducing four new opcodes. These opcodes enable several enhancements for the Lightning Network, including the creation of symmetrical channels, non-interactive channels, and more efficient vault setups. The proposal also introduces payment pools, which allow users to share UTXOs and create channels without requiring individual transaction footprints on-chain. Overall, LNhance seeks to advance Bitcoin's capabilities by facilitating more efficient and secure transactions within the Lightning Network.
Audio Summary below👇🏽👇🏽
originally posted at https://stacker.news/items/729359
-
@ 3bf0c63f:aefa459d
2024-01-14 13:55:28O Planetinha
Fumaça verde me entrando pelas narinas e um coro desafinado fazia uma base melódica.
nos confins da galáxia havia um planetinha isolado. Era um planeta feliz.
O homem vestido de mago começava a aparecer por detrás da fumaça verde.
O planetinha recebeu três presentes, mas o seu habitante, o homem, estava num estado de confusão tão grande que ameaçava estragá-los. Os homens já havia escravizado o primeiro presente, a vida; lutavam contra o segundo presente, a morte; e havia alguns que achavam que deviam destruir totalmente o terceiro, o amor, e com isto levar a desordem total ao pobre planetinha perdido, que se chamava Terra.
O coro desafinado entrou antes do "Terra" cantando várias vezes, como se imitasse um eco, "terra-terra-terraaa". Depois de uma pausa dramática, o homem vestido de mago voltou a falar.
Terra, nossa nave mãe.
Neste momento eu me afastei. À frente do palco onde o mago e seu coral faziam apelos à multidão havia vários estandes cobertos com a tradicional armação de quatro pernas e lona branca. Em todos os cantos da praça havia gente, gente dos mais variados tipos. Visitantes curiosos que se aproximavam atraídos pela fumaça verde e as barraquinhas, gente que aproveitava o movimento para vender doces sem pagar imposto, casais que se abraçavam de pé para espantar o frio, os tradicionais corredores que faziam seu cooper, gente cheia de barba e vestida para imitar os hippies dos anos 60 e vender colares estendidos no chão, transeuntes novos e velhos, vestidos como baladeiros ou como ativistas do ônibus grátis, grupos de ciclistas entusiastas.
O mago fazia agora apelos para que nós, os homens, habitantes do isolado planetinha, passássemos a ver o planetinha, nossa nave mãe, como um todo, e adquiríssemos a consciência de que ele estava entrando em maus lençóis. A idéia, reforçada pela logomarca do evento, era que parássemos de olhar só para a nossa vida e pensássemos no planeta.
A logomarca do evento, um desenho estilizado do planeta Terra, nada tinha a ver com seu nome: "Festival Andando de Bem com a Vida", mas havia sido ali colocada estrategicamente pelos organizadores, de quem parecia justamente sair a mensagem dita pelo mago.
Aquela multidão de pessoas que, assim como eu, tinham suas próprias preocupações, não podiam ver o quadro caótico que formavam, cada uma com seus atos isolados, ali naquela praça isolada, naquele planeta isolado. Quando o hippie barbudo, quase um Osho, assustava um casal para tentar vender-lhes um colar, a quantidade de caos que isto acrescentava à cena era gigantesca. Por um segundo, pude ver, como se estivesse de longe e acima, com toda a pretensão que este estado imaginativo carrega, a cena completa do caos.
Uma nave-mãe, dessas de ficção científica, habitada por milhões de pessoas, seguia no espaço sem rumo, e sem saber que logo à frente um longo precipício espacial a esperava, para a desgraça completa sua e de seus habitantes.
Acostumados àquela nave tanto quanto outrora estiveram acostumados à sua terra natal, os homens viviam as próprias vidas sem nem se lembrar que estavam vagando pelo espaço. Ninguém sabia quem estava conduzindo a nave, e ninguém se importava.
No final do filme descobre-se que era a soma completa do caos que cada habitante produzia, com seus gestos egoístas e incapazes de levar em conta a totalidade, é que determinava a direção da nave-mãe. O efeito, no entanto, não era imediato, como nunca é. Havia gente de verdade encarregada de conduzir a nave, mas era uma gente bêbada, mau-caráter, que vivia brigando pelo controle da nave e o poder que isto lhes dava. Poder, status, dinheiro!
Essa gente bêbada era atraída até ali pela corrupção das instituições e da moral comum que, no fundo no fundo, era causada pelo egoísmo da população, através de um complexo -- mas que no filme aparece simplificado pela ação individual de um magnata do divertimento público -- processo social.
O homem vestido de mago era mais um agente causador de caos, com sua cena cheia de fumaça e sua roupa estroboscópica, ele achava que estava fazendo o bem ao alertar sua platéia, todos as sextas-feiras, de que havia algo que precisava ser feito, que cada um que estava ali ouvindo era responsável pelo planeta. A sua incapacidade, porém, de explicar o que precisava ser feito só aumentava a angústia geral; a culpa que ele jogava sobre seu público, e que era prontamente aceita e passada em frente, aos familiares e amigos de cada um, atormentava-os diariamente e os impedia de ter uma vida decente no trabalho e em casa. As famílias, estressadas, estavam constantemente brigando e os motivos mais insignificantes eram responsáveis pelas mais horrendas conseqüências.
O mago, que após o show tirava o chapéu entortado e ia tomar cerveja num boteco, era responsável por uma parcela considerável do caos que levava a nave na direção do seu desgraçado fim. No filme, porém, um dos transeuntes que de passagem ouviu um pedaço do discurso do mago despertou em si mesmo uma consiência transformadora e, com poderes sobre-humanos que lhe foram então concedidos por uma ordem iniciática do bem ou não, usando só os seus poderes humanos mesmo, o transeunte -- na primeira versão do filme um homem, na segunda uma mulher -- consegue consertar as instituições e retirar os bêbados da condução da máquina. A questão da moral pública é ignorada para abreviar a trama, já com duas horas e quarenta de duração, mas subentende-se que ela também fora resolvida.
No planeta Terra real, que não está indo em direção alguma, preso pela gravidade ao Sol, e onde as pessoas vivem a própria vida porque lhes é impossível viver a dos outros, não têm uma consciência global de nada porque só é possível mesmo ter a consciência delas mesmas, e onde a maioria, de uma maneira ou de outra, está tentando como pode, fazer as coisas direito, o filme é exibido.
Para a maioria dos espectadores, é um filme que evoca reflexões, um filme forte. Por um segundo elas têm o mesmo vislumbre do caos generalizado que eu tive ali naquela praça. Para uma pequena parcela dos espectadores -- entre eles alguns dos que estavam na platéia do mago, o próprio mago, o seguidor do Osho, o casal de duas mulheres e o vendedor de brigadeiros, mas aos quais se somam também críticos de televisão e jornal e gente que fala pelos cotovelos na internet -- o filme é um horror, o filme é uma vulgarização de um problema real e sério, o filme apela para a figura do herói salvador e passa uma mensagem totalmente errada, de que a maioria da população pode continuar vivendo as suas própria vidinhas miseráveis enquanto espera por um herói que vem do Olimpo e os salva da mixórdia que eles mesmos causaram, é um filme que presta um enorme desserviço à causa.
No dia seguinte ao lançamento, num bar meio caro ali perto da praça, numa mesa com oito pessoas, entre elas seis do primeiro grupo e oito do segundo, discute-se se o filme levará ou não o Oscar. Eu estou em casa dormindo e não escuto nada.
-
@ f977c464:32fcbe00
2024-01-11 18:47:47Kendisini aynada ilk defa gördüğü o gün, diğerleri gibi olduğunu anlamıştı. Oysaki her insan biricik olmalıydı. Sözgelimi sinirlendiğinde bir kaşı diğerinden birkaç milimetre daha az çatılabilirdi veya sevindiğinde dudağı ona has bir açıyla dalgalanabilirdi. Hatta bunların hiçbiri mümkün değilse, en azından, gözlerinin içinde sadece onun sahip olabileceği bir ışık parlayabilirdi. Çok sıradan, öyle sıradan ki kimsenin fark etmediği o milyonlarca minik şeyden herhangi biri. Ne olursa.
Ama yansımasına bakarken bunların hiçbirini bulamadı ve diğer günlerden hiç de farklı başlamamış o gün, işe gitmek için vagonunun gelmesini beklediği alelade bir metro istasyonunda, içinde kaybolduğu illüzyon dağılmaya başladı.
İlk önce derisi döküldü. Tam olarak dökülmedi aslında, daha çok kıvılcımlara dönüşüp bedeninden fırlamış ve bir an sonra sönerek külleşmiş, havada dağılmıştı. Ardında da, kaybolmadan hemen önce, kısa süre için hayal meyal görülebilen, bir ruhun yok oluşuna ağıt yakan rengârenk peri cesetleri bırakmıştı. Beklenenin aksine, havaya toz kokusu yayıldı.
Dehşete düştü elbette. Dehşete düştüler. Panikle üstlerini yırtan 50 işçi. Her şeyin sebebiyse o vagon.
Saçları da döküldü. Her tel, yere varmadan önce, her santimde ikiye ayrıla ayrıla yok oldu.
Bütün yüzeylerin mat olduğu, hiçbir şeyin yansımadığı, suyun siyah aktığı ve kendine ancak kameralarla bakabildiğin bir dünyada, vagonun içine yerleştirilmiş bir aynadan ilk defa kendini görmek.
Gözlerinin akları buharlaşıp havada dağıldı, mercekleri boşalan yeri doldurmak için eriyip yayıldı. Gerçeği görmemek için yaratılmış, bu yüzden görmeye hazır olmayan ve hiç olmayacak gözler.
Her şeyin o anda sona erdiğini sanabilirdi insan. Derin bir karanlık ve ölüm. Görmenin görmek olduğu o anın bitişi.
Ben geldiğimde ölmüşlerdi.
Yani bozulmuşlardı demek istiyorum.
Belleklerini yeni taşıyıcılara takmam mümkün olmadı. Fiziksel olarak kusursuz durumdaydılar, olmayanları da tamir edebilirdim ama tüm o hengamede kendilerini baştan programlamış ve girdilerini modifiye etmişlerdi.
Belleklerden birini masanın üzerinden ileriye savurdu. Hınca hınç dolu bir barda oturuyorlardı. O ve arkadaşı.
Sırf şu kendisini insan sanan androidler travma geçirip delirmesin diye neler yapıyoruz, insanın aklı almıyor.
Eliyle arkasını işaret etti.
Polislerin söylediğine göre biri vagonun içerisine ayna yerleştirmiş. Bu zavallılar da kapı açılıp bir anda yansımalarını görünce kafayı kırmışlar.
Arkadaşı bunların ona ne hissettirdiğini sordu. Yani o kadar bozuk, insan olduğunu sanan androidi kendilerini parçalamış olarak yerde görmek onu sarsmamış mıydı?
Hayır, sonuçta belirli bir amaç için yaratılmış şeyler onlar. Kaliteli bir bilgisayarım bozulduğunda üzülürüm çünkü parasını ben vermişimdir. Bunlarsa devletin. Bana ne ki?
Arkadaşı anlayışla kafasını sallayıp suyundan bir yudum aldı. Kravatını biraz gevşetti.
Bira istemediğinden emin misin?
İstemediğini söyledi. Sahi, neden deliriyordu bu androidler?
Basit. Onların yapay zekâlarını kodlarken bir şeyler yazıyorlar. Yazılımcılar. Biliyorsun, ben donanımdayım. Bunlar da kendilerini insan sanıyorlar. Tiplerine bak.
Sesini alçalttı.
Arabalarda kaza testi yapılan mankenlere benziyor hepsi. Ağızları burunları bile yok ama şu geldiğimizden beri sakalını düzeltip duruyor mesela. Hayır, hepsi de diğerleri onun sakalı varmış sanıyor, o manyak bir şey.
Arkadaşı bunun delirmeleriyle bağlantısını çözemediğini söyledi. O da normal sesiyle konuşmaya devam etti.
Anlasana, aynayı falan ayırt edemiyor mercekleri. Lönk diye kendilerini görüyorlar. Böyle, olduğu gibi...
Nedenmiş peki? Ne gerek varmış?
Ne bileyim be abicim! Ahiret soruları gibi.
Birasına bakarak dalıp gitti. Sonra masaya abanarak arkadaşına iyice yaklaştı. Bulanık, bir tünelin ucundaki biri gibi, şekli şemalı belirsiz bir adam.
Ben seni nereden tanıyorum ki ulan? Kimsin sen?
Belleği makineden çıkardılar. İki kişiydiler. Soruşturmadan sorumlu memurlar.
─ Baştan mı başlıyoruz, diye sordu belleği elinde tutan ilk memur.
─ Bir kere daha deneyelim ama bu sefer direkt aynayı sorarak başla, diye cevapladı ikinci memur.
─ Bence de. Yeterince düzgün çalışıyor.
Simülasyon yüklenirken, ayakta, biraz arkada duran ve alnını kaşıyan ikinci memur sormaktan kendisini alamadı:
─ Bu androidleri niye böyle bir olay yerine göndermişler ki? Belli tost olacakları. İsraf. Gidip biz baksak aynayı kırıp delilleri mahvetmek zorunda da kalmazlar.
Diğer memur sandalyesinde hafifçe dönecek oldu, o sırada soruyu bilgisayarın hoparlöründen teknisyen cevapladı.
Hangi işimizde bir yamukluk yok ki be abi.
Ama bir son değildi. Üstlerindeki tüm illüzyon dağıldığında ve çıplak, cinsiyetsiz, birbirinin aynı bedenleriyle kaldıklarında sıra dünyaya gelmişti.
Yere düştüler. Elleri -bütün bedeni gibi siyah turmalinden, boğumları çelikten- yere değdiği anda, metronun zemini dağıldı.
Yerdeki karolar öncesinde beyazdı ve çok parlaktı. Tepelerindeki floresan, ışığını olduğu gibi yansıtıyor, tek bir lekenin olmadığı ve tek bir tozun uçmadığı istasyonu aydınlatıyorlardı.
Duvarlara duyurular asılmıştı. Örneğin, yarın akşam kültür merkezinde 20.00’da başlayacak bir tekno blues festivalinin cıvıl cıvıl afişi vardı. Onun yanında daha geniş, sarı puntolu harflerle yazılmış, yatay siyah kesiklerle çerçevesi çizilmiş, bir platformdan düşen çöp adamın bulunduğu “Dikkat! Sarı bandı geçmeyin!” uyarısı. Biraz ilerisinde günlük resmi gazete, onun ilerisinde bir aksiyon filminin ve başka bir romantik komedi filminin afişleri, yapılacakların ve yapılmayacakların söylendiği küçük puntolu çeşitli duyurular... Duvar uzayıp giden bir panoydu. On, on beş metrede bir tekrarlanıyordu.
Tüm istasyonun eni yüz metre kadar. Genişliği on metre civarı.
Önlerinde, açık kapısından o mendebur aynanın gözüktüğü vagon duruyordu. Metro, istasyona sığmayacak kadar uzundu. Bir kılıcın keskinliğiyle uzanıyor ama yer yer vagonların ek yerleriyle bölünüyordu.
Hiçbir vagonda pencere olmadığı için metronun içi, içlerindekiler meçhuldü.
Sonrasında karolar zerrelerine ayrılarak yükseldi. Floresanın ışığında her yeri toza boğdular ve ortalığı gri bir sisin altına gömdüler. Çok kısa bir an. Afişleri dalgalandırmadılar. Dalgalandırmaya vakitleri olmadı. Yerlerinden söküp aldılar en fazla. Işık birkaç kere sönüp yanarak direndi. Son kez söndüğünde bir daha geri gelmedi.
Yine de etraf aydınlıktı. Kırmızı, her yere eşit dağılan soluk bir ışıkla.
Yer tamamen tele dönüşmüştü. Altında çapraz hatlarla desteklenmiş demir bir iskelet. Işık birkaç metreden daha fazla aşağıya uzanamıyordu. Sonsuzluğa giden bir uçurum.
Duvarın yerini aynı teller ve demir iskelet almıştı. Arkasında, birbirine vidalarla tutturulmuş demir plakalardan oluşan, üstünden geçen boruların ek yerlerinden bazen ince buharların çıktığı ve bir süre asılı kaldıktan sonra ağır, yağlı bir havayla sürüklendiği bir koridor.
Diğer tarafta paslanmış, pencerelerindeki camlar kırıldığı için demir plakalarla kapatılmış külüstür bir metro. Kapının karşısındaki aynadan her şey olduğu gibi yansıyordu.
Bir konteynırın içini andıran bir evde, gerçi gayet de birbirine eklenmiş konteynırlardan oluşan bir şehirde “andıran” demek doğru olmayacağı için düpedüz bir konteynırın içinde, masaya mum görüntüsü vermek için koyulmuş, yarı katı yağ atıklarından şekillendirilmiş kütleleri yakmayı deniyordu. Kafasında hayvan kıllarından yapılmış grili siyahlı bir peruk. Aynı kıllardan kendisine gür bir bıyık da yapmıştı.
Üstünde mavi çöp poşetlerinden yapılmış, kravatlı, şık bir takım.
Masanın ayakları yerine oradan buradan çıkmış parçalar konulmuştu: bir arabanın şaft mili, üst üste konulmuş ve üstünde yazı okunamayan tenekeler, boş kitaplar, boş gazete balyaları... Hiçbir şeye yazı yazılmıyordu, gerek yoktu da zaten çünkü merkez veri bankası onları fark ettirmeden, merceklerden giren veriyi sentezleyerek insanlar için dolduruyordu. Yani, androidler için. Farklı şekilde isimlendirmek bir fark yaratacaksa.
Onların mercekleri için değil. Bağlantıları çok önceden kopmuştu.
─ Hayatım, sofra hazır, diye bağırdı yatak odasındaki karısına.
Sofrada tabak yerine düz, bardak yerine bükülmüş, çatal ve bıçak yerine sivriltilmiş plakalar.
Karısı salonun kapısında durakladı ve ancak kulaklarına kadar uzanan, kocasınınkine benzeyen, cansız, ölü hayvanların kıllarından ibaret peruğunu eliyle düzeltti. Dudağını, daha doğrusu dudağının olması gereken yeri koyu kırmızı bir yağ tabakasıyla renklendirmeyi denemişti. Biraz da yanaklarına sürmüştü.
─ Nasıl olmuş, diye sordu.
Sesi tek düzeydi ama hafif bir neşe olduğunu hissettiğinize yemin edebilirdiniz.
Üzerinde, çöp poşetlerinin içini yazısız gazete kağıtlarıyla doldurarak yaptığı iki parça giysi.
─ Çok güzelsin, diyerek kravatını düzeltti kocası.
─ Sen de öylesin, sevgilim.
Yaklaşıp kocasını öptü. Kocası da onu. Sonra nazikçe elinden tutarak, sandalyesini geriye çekerek oturmasına yardım etti.
Sofrada yemek niyetine hiçbir şey yoktu. Gerek de yoktu zaten.
Konteynırın kapısı gürültüyle tekmelenip içeri iki memur girene kadar birbirlerine öyküler anlattılar. O gün neler yaptıklarını. İşten erken çıkıp yemyeşil çimenlerde gezdiklerini, uçurtma uçurduklarını, kadının nasıl o elbiseyi bulmak için saatlerce gezip yorulduğunu, kocasının kısa süreliğine işe dönüp nasıl başarılı bir hamleyle yaşanan krizi çözdüğünü ve kadının yanına döndükten sonra, alışveriş merkezinde oturdukları yeni dondurmacının dondurmalarının ne kadar lezzetli olduğunu, boğazlarının ağrımasından korktuklarını...
Akşam film izleyebilirlerdi, televizyonda -boş ve mat bir plaka- güzel bir film oynayacaktı.
İki memur. Çıplak bedenleriyle birbirinin aynı. Ellerindeki silahları onlara doğrultmuşlardı. Mum ışığında, tertemiz bir örtünün serili olduğu masada, bardaklarında şaraplarla oturan ve henüz sofranın ortasındaki hindiye dokunmamış çifti gördüklerinde bocaladılar.
Hiç de androidlere bilinçli olarak zarar verebilecek gibi gözükmüyorlardı.
─ Sessiz kalma hakkına sahipsiniz, diye bağırdı içeri giren ikinci memur. Söylediğiniz her şey...
Cümlesini bitiremedi. Yatak odasındaki, masanın üzerinden gördüğü o şey, onunla aynı hareketleri yapan android, yoksa, bir aynadaki yansıması mıydı?
Bütün illüzyon o anda dağılmaya başladı.
Not: Bu öykü ilk olarak 2020 yılında Esrarengiz Hikâyeler'de yayımlanmıştır.
-
@ 8cb60e21:5f2deaea
2024-08-24 23:52:38 -
@ 8cb60e21:5f2deaea
2024-08-24 23:33:51test
-
@ 8fb140b4:f948000c
2023-11-21 21:37:48Embarking on the journey of operating your own Lightning node on the Bitcoin Layer 2 network is more than just a tech-savvy endeavor; it's a step into a realm of financial autonomy and cutting-edge innovation. By running a node, you become a vital part of a revolutionary movement that's reshaping how we think about money and digital transactions. This role not only offers a unique perspective on blockchain technology but also places you at the heart of a community dedicated to decentralization and network resilience. Beyond the technicalities, it's about embracing a new era of digital finance, where you contribute directly to the network's security, efficiency, and growth, all while gaining personal satisfaction and potentially lucrative rewards.
In essence, running your own Lightning node is a powerful way to engage with the forefront of blockchain technology, assert financial independence, and contribute to a more decentralized and efficient Bitcoin network. It's an adventure that offers both personal and communal benefits, from gaining in-depth tech knowledge to earning a place in the evolving landscape of cryptocurrency.
Running your own Lightning node for the Bitcoin Layer 2 network can be an empowering and beneficial endeavor. Here are 10 reasons why you might consider taking on this task:
-
Direct Contribution to Decentralization: Operating a node is a direct action towards decentralizing the Bitcoin network, crucial for its security and resistance to control or censorship by any single entity.
-
Financial Autonomy: Owning a node gives you complete control over your financial transactions on the network, free from reliance on third-party services, which can be subject to fees, restrictions, or outages.
-
Advanced Network Participation: As a node operator, you're not just a passive participant but an active player in shaping the network, influencing its efficiency and scalability through direct involvement.
-
Potential for Higher Revenue: With strategic management and optimal channel funding, your node can become a preferred route for transactions, potentially increasing the routing fees you can earn.
-
Cutting-Edge Technological Engagement: Running a node puts you at the forefront of blockchain and bitcoin technology, offering insights into future developments and innovations.
-
Strengthened Network Security: Each new node adds to the robustness of the Bitcoin network, making it more resilient against attacks and failures, thus contributing to the overall security of the ecosystem.
-
Personalized Fee Structures: You have the flexibility to set your own fee policies, which can balance earning potential with the service you provide to the network.
-
Empowerment Through Knowledge: The process of setting up and managing a node provides deep learning opportunities, empowering you with knowledge that can be applied in various areas of blockchain and fintech.
-
Boosting Transaction Capacity: By running a node, you help to increase the overall capacity of the Lightning Network, enabling more transactions to be processed quickly and at lower costs.
-
Community Leadership and Reputation: As an active node operator, you gain recognition within the Bitcoin community, which can lead to collaborative opportunities and a position of thought leadership in the space.
These reasons demonstrate the impactful and transformative nature of running a Lightning node, appealing to those who are deeply invested in the principles of bitcoin and wish to actively shape its future. Jump aboard, and embrace the journey toward full independence. 🐶🐾🫡🚀🚀🚀
-
-
@ 6ad3e2a3:c90b7740
2024-10-18 13:04:03Virtually everyone knows this parable and its self-evident wisdom. But I think we can apply this Solomonic technique to some issues that have arisen recently.
There has been a concerted push of late to rid the internet, particularly social media, of “misinformation.” The idea is that the First Amendment, which protects free speech, is too permissive in an environment where people can amplify falsehoods at scale. Those who would police misinformation argue the harms of misinformation outweigh the benefits of free expression.
Those (like me) who believe in the First Amendment don’t dispute that it protects online expression that could turn out to be false, and that false information can lead to real-life harm. But my belief is the far greater harm is in stifling free expression because (a) no one is wise enough to be the ultimate arbiter of truth; (b) false assertions can be corrected by true ones; and that (c) disallowing free speech is a path to the ultimate tyranny wherein the only corrective mechanism we have has been totally disabled.
I believe were King Solomon to weigh in on this dispute he would say, “Let’s flip a coin. If it’s heads, ideas with which I disagree would be banned, and if it’s tails the ideas with which I agree would be banned.” Then he would take me aside and whisper: “Don’t worry, both sides of the coin are heads!” (And he would take the misinformation police aside and assure them both were tails.)
At which point, I would say, “No! I don’t want opposing ideas to be banned! I want dissenters to be able to make their case because maybe I’m wrong about something.” By contrast, the misinformation police would say, “Great, we can finally rid the internet of harmful wrongthink! Let’s have the coin flip!”
And then Solomon would say, “The greatest purveyor of misinformation over the long haul is those who would police it” and re-affirm a commitment to the First Amendment.
. . .
I saw a recent interview with J.D. Vance where he was asked whether he believed the 2020 election were stolen. Vance pivoted to talking about the effect of censoring the Hunter Biden laptop story, but I think he might have asked a more pertinent question back of the interviewer, namely, “Would you concede an election you earnestly believed were stolen, i.e., one where you believed Kamala Harris had won fair and square, but only due to cheating Trump were declared the winner?”
In other words, would you accept the results of an election you thought were fraudulent? The answer is obvious: one must accept a fair result and reject a rigged one, no matter who wins.
Of course, because both sides are so distrustful of one another, that means any result could be rejected on suspicion of fraud, and a peaceful transfer of power would therefore be impossible. How to resolve this dilemma?
Enter Solomon who asks: “Who is willing to take all necessary measures to ensure undetected fraud cannot occur?”
And then depending on which side were advocating for voter ID, hand-counted paper ballots, one-to-one signature matches, transparent and open access to recounts, rigorous purging of non-citizens from voter rolls and a process that was completely auditable from start to finish, he would declare that side as the one upholding the democratic process.
. . .
Humans are fallible, they make errors, they cheat, lie and manipulate. One cannot merely trust technocrats to know what’s true and false any more than one can trust election officials to administer high-stakes elections without total transparency.
It doesn’t matter whether you have the “correct” beliefs or belong to the faction that is “good.” Everyone thinks his beliefs are correct, virtually everyone believes his party is the good one. To the extent you care about the truth, you will view dissent policing as the ultimate scourge. To the extent you have respect for democratic institutions that ensure the peaceful transfer of power you must view opaque and inauditable elections as the ultimate threat to the state’s legitimacy.
If you make exceptions because in the short term they help your cause, you are like the mother in the parable, willfully and short-sightedly sacrificing the thing about which you purport to care the most
-
@ 3bf0c63f:aefa459d
2024-06-07 15:27:10Report of how the money Jack donated to the cause in December 2022 is being spent.
Bounties given
June 2024
- Darashi: 5,000,000 - maintaining nos.today, searchnos, search.nos.today and other experiments
- Toshiya: 5,000,000 - keeping the NIPs repo clean and other stuff
May 2024
- James: 3,500,000 - https://github.com/jamesmagoo/nostr-writer
- Yakihonne: 5,000,000 - spreading the word in Asia
- Dashu: 9,000,000 - https://github.com/haorendashu/nostrmo
February 2024
- Viktor: 5,000,000 - https://github.com/viktorvsk/saltivka and https://github.com/viktorvsk/knowstr
- Eric T: 5,000,000 - https://github.com/tcheeric/nostr-java
- Semisol: 5,000,000 - https://relay.noswhere.com/ and https://hist.nostr.land relays
- Sebastian: 5,000,000 - Drupal stuff and nostr-php work
- tijl: 5,000,000 - Cloudron, Yunohost and Fraidycat attempts
- Null Kotlin Dev: 5,000,000 - AntennaPod attempt
December 2023
- hzrd: 5,000,000 - Nostrudel
- awayuki: 5,000,000 - NOSTOPUS illustrations
- bera: 5,000,000 - getwired.app
- Chris: 5,000,000 - resolvr.io
- NoGood: 10,000,000 - nostrexplained.com stories
October 2023
- SnowCait: 5,000,000 - https://nostter.vercel.app/ and other tools
- Shaun: 10,000,000 - https://yakihonne.com/, events and work on Nostr awareness
- Derek Ross: 10,000,000 - spreading the word around the world
- fmar: 5,000,000 - https://github.com/frnandu/yana
- The Nostr Report: 2,500,000 - curating stuff
- james magoo: 2,500,000 - the Obsidian plugin: https://github.com/jamesmagoo/nostr-writer
August 2023
- Paul Miller: 5,000,000 - JS libraries and cryptography-related work
- BOUNTY tijl: 5,000,000 - https://github.com/github-tijlxyz/wikinostr
- gzuus: 5,000,000 - https://nostree.me/
July 2023
- syusui-s: 5,000,000 - rabbit, a tweetdeck-like Nostr client: https://syusui-s.github.io/rabbit/
- kojira: 5,000,000 - Nostr fanzine, Nostr discussion groups in Japan, hardware experiments
- darashi: 5,000,000 - https://github.com/darashi/nos.today, https://github.com/darashi/searchnos, https://github.com/darashi/murasaki
- jeff g: 5,000,000 - https://nostr.how and https://listr.lol, plus other contributions
- cloud fodder: 5,000,000 - https://nostr1.com (open-source)
- utxo.one: 5,000,000 - https://relaying.io (open-source)
- Max DeMarco: 10,269,507 - https://www.youtube.com/watch?v=aA-jiiepOrE
- BOUNTY optout21: 1,000,000 - https://github.com/optout21/nip41-proto0 (proposed nip41 CLI)
- BOUNTY Leo: 1,000,000 - https://github.com/leo-lox/camelus (an old relay thing I forgot exactly)
June 2023
- BOUNTY: Sepher: 2,000,000 - a webapp for making lists of anything: https://pinstr.app/
- BOUNTY: Kieran: 10,000,000 - implement gossip algorithm on Snort, implement all the other nice things: manual relay selection, following hints etc.
- Mattn: 5,000,000 - a myriad of projects and contributions to Nostr projects: https://github.com/search?q=owner%3Amattn+nostr&type=code
- BOUNTY: lynn: 2,000,000 - a simple and clean git nostr CLI written in Go, compatible with William's original git-nostr-tools; and implement threaded comments on https://github.com/fiatjaf/nocomment.
- Jack Chakany: 5,000,000 - https://github.com/jacany/nblog
- BOUNTY: Dan: 2,000,000 - https://metadata.nostr.com/
April 2023
- BOUNTY: Blake Jakopovic: 590,000 - event deleter tool, NIP dependency organization
- BOUNTY: koalasat: 1,000,000 - display relays
- BOUNTY: Mike Dilger: 4,000,000 - display relays, follow event hints (Gossip)
- BOUNTY: kaiwolfram: 5,000,000 - display relays, follow event hints, choose relays to publish (Nozzle)
- Daniele Tonon: 3,000,000 - Gossip
- bu5hm4nn: 3,000,000 - Gossip
- BOUNTY: hodlbod: 4,000,000 - display relays, follow event hints
March 2023
- Doug Hoyte: 5,000,000 sats - https://github.com/hoytech/strfry
- Alex Gleason: 5,000,000 sats - https://gitlab.com/soapbox-pub/mostr
- verbiricha: 5,000,000 sats - https://badges.page/, https://habla.news/
- talvasconcelos: 5,000,000 sats - https://migrate.nostr.com, https://read.nostr.com, https://write.nostr.com/
- BOUNTY: Gossip model: 5,000,000 - https://camelus.app/
- BOUNTY: Gossip model: 5,000,000 - https://github.com/kaiwolfram/Nozzle
- BOUNTY: Bounty Manager: 5,000,000 - https://nostrbounties.com/
February 2023
- styppo: 5,000,000 sats - https://hamstr.to/
- sandwich: 5,000,000 sats - https://nostr.watch/
- BOUNTY: Relay-centric client designs: 5,000,000 sats https://bountsr.org/design/2023/01/26/relay-based-design.html
- BOUNTY: Gossip model on https://coracle.social/: 5,000,000 sats
- Nostrovia Podcast: 3,000,000 sats - https://nostrovia.org/
- BOUNTY: Nostr-Desk / Monstr: 5,000,000 sats - https://github.com/alemmens/monstr
- Mike Dilger: 5,000,000 sats - https://github.com/mikedilger/gossip
January 2023
- ismyhc: 5,000,000 sats - https://github.com/Galaxoid-Labs/Seer
- Martti Malmi: 5,000,000 sats - https://iris.to/
- Carlos Autonomous: 5,000,000 sats - https://github.com/BrightonBTC/bija
- Koala Sat: 5,000,000 - https://github.com/KoalaSat/nostros
- Vitor Pamplona: 5,000,000 - https://github.com/vitorpamplona/amethyst
- Cameri: 5,000,000 - https://github.com/Cameri/nostream
December 2022
- William Casarin: 7 BTC - splitting the fund
- pseudozach: 5,000,000 sats - https://nostr.directory/
- Sondre Bjellas: 5,000,000 sats - https://notes.blockcore.net/
- Null Dev: 5,000,000 sats - https://github.com/KotlinGeekDev/Nosky
- Blake Jakopovic: 5,000,000 sats - https://github.com/blakejakopovic/nostcat, https://github.com/blakejakopovic/nostreq and https://github.com/blakejakopovic/NostrEventPlayground
-
@ 8cb60e21:5f2deaea
2024-08-24 23:29:20 -
@ 8cb60e21:5f2deaea
2024-08-24 23:26:03hello draft
-
@ 3c984938:2ec11289
2024-06-07 11:14:17The Chamorros: People of my island
They islanders for centuries took care of the island. They fished, farmed, hunted, voyaged, made tools, art, had stories, had marriages within clans. Then, the Spanish came. When they first came, the Chamorros boarded their boat to greet the weird people(I'm sure they thought they were weird too). It started peaceful until the Spaniards coffer's slowly dried up. This led to the occupation of the island and grew oppressive. Eventually, The Spanish lost the war to the Americans. Guam was then sold to the American gov't as spoils of war, trading one oppressive regime for another.
The TakeOver Process-1
The TakeOver Process-2
The TakeOver Process-3
Get a job, you lazy islanders. We need to tax you, come work for us. This was the price to become American to the indigenous islanders.
Then the war came.
close up
Guam was hit first before Pearl Harbor(The international Date line puts Guam timezone first ahead) but after this, The Japanese invaded and then occupied the island. Note at the bottom, The American Naval governor surrendered. This led to the islanders thus to become slaves to the Japanese Empire.
Recall "Day of Infamy" by FDR
Life under Japanese Rule Note Northern Marianas islands are the smaller islands above Guam. See the next image below.
Map of the island geography. Guam is referred as NYC in the Marianas. The rest are really, really small.
Nearly 16k of indigenous islander died, by the end of the war less than 6kish Chamorro survived.
The Federal Government then claimed parts of the land and since then and haven't returned it. They've returned some of it. This was a long time ago, I think it's time to let it go. Some islanders demand war repatriations. It makes zero sense to demand money from future Americans to pay for those war repatriations. The enemy is not the people, it's those that wield the pen to create unreasonable bills and the ones that enforce it.
Final Words. The islanders lived peaceful. There was no room to be a bad person of the colony because that person was risked getting shunned. Often, they sent the bad natives (thus becoming 2nd class citizens) inland, barring them from getting access to the ocean. But the land is rich and fertile. Instead of saltwater fish, they had fresh water 🐟fish, 🐍eel, 🦐shrimp and 🦞crawfish and plenty of fruit to eat and farm.
They didn't ask to become Spanish or American. It was this way or the highway. When countries want to expand they need more territories, land, money and human capital(your life energy). History doesn't repeat, it just rhymes.
🦋The best way to combat this is go back to a similar economy that is less corruptible. I believe Bitcoin can do this. History gives clues. Don't trust, verify.
Thank you for joining me on this walk (lol, reading) through the museum, please comment if you enjoyed this.
-
@ a012dc82:6458a70d
2024-10-18 08:27:48Table Of Content
-
BlackRock's Bold Move
-
The Potential Impact on Bitcoin's Price
-
The Role of Retail Investors
-
The Future of Bitcoin
-
Conclusion
-
FAQ
The world of digital assets has been gaining significant traction, with traditional financial firms finally acknowledging that cryptocurrencies are here to stay. This shift in perception is not without reason. The potential of cryptocurrencies to revolutionize financial transactions, coupled with their growing acceptance as a legitimate asset class, has made them impossible to ignore. Among the key players making waves in the crypto space is BlackRock, the world's largest asset manager, boasting $9 trillion in assets under management (AUM). The firm recently filed for permission to create a "spot market" Bitcoin-based exchange-traded fund (ETF), a move that could potentially slingshot Bitcoin's price skyward. This move signifies a significant shift in the traditional finance world's approach to digital assets, marking a new era of acceptance and integration.
BlackRock's Bold Move
BlackRock's decision to venture into the Bitcoin ETF space is a significant development in the crypto industry. The United States Securities and Exchange Commission has historically been resistant to Bitcoin ETFs, making BlackRock's move a bold one. This decision is not just a gamble but a calculated move based on the growing demand for digital assets and the potential they hold. This move, coupled with similar actions from other financial giants like Fidelity Investments, Charles Schwab, and Citadel, has already had a positive impact on the crypto market. The announcement alone has boosted crypto trading markets, with Bitcoin gaining 20% in a week and surpassing the $30,000 mark for the first time since April. This price surge is a testament to the influence these financial institutions wield in the market.
The Potential Impact on Bitcoin's Price
The creation of a Bitcoin ETF by a firm as influential as BlackRock could potentially transform the Bitcoin market. Bitcoin's fixed supply limit of 21 million BTC and its existing inventory's relative illiquidity could lead to a supply-demand imbalance. With 68% of BTC in circulation remaining unmoved in the past year, there isn't a lot of stock available for BlackRock and other interested parties to snap up. If demand exceeds supply, it could inevitably lead to price gains for Bitcoin. This scenario could potentially create a bullish market for Bitcoin, driving its price to new heights. However, it's important to note that this is a hypothetical scenario, and the actual impact will depend on a variety of factors, including regulatory decisions and market dynamics.
The Role of Retail Investors
While institutional investors like BlackRock play a significant role in the crypto market, the role of retail investors cannot be overlooked. The participation of ordinary crypto users might be necessary to stabilize the price of Bitcoin. As more institutional investors enter the market, retail investors may also be encouraged to participate, potentially leading to an increase in trading volume and further price appreciation. Retail investors bring a different dynamic to the market. Their participation could lead to increased liquidity and could also serve as a counterbalance to the large trades made by institutional investors. The involvement of retail investors could also lead to a more diverse and robust market, contributing to the overall health and stability of the Bitcoin ecosystem.
The Future of Bitcoin
The entry of BlackRock and other major asset managers into the Bitcoin space could potentially stabilize Bitcoin's price at a substantially higher level than the current $30,000. However, long-term price stability also requires broad retail participation. The involvement of large financial institutions in the digital asset market has arguably had a calming effect on retail investors, which could lead to increased acceptance and trading volume in the coming months. As the market matures and regulatory clarity improves, we could see a more balanced market with both institutional and retail investors playing significant roles. This balance could contribute to the long-term stability and growth of Bitcoin's price.
Conclusion
The involvement of large financial institutions, such as BlackRock, in the crypto markets represents a significant shift and a decisive moment for these markets, both in the U.S. and globally. While it's still early days, the potential impact of BlackRock's proposed Bitcoin ETF on Bitcoin's price cannot be underestimated. If institutional investors continue to enter the market, their demand could certainly drive prices higher, potentially propelling Bitcoin's price to the moon. However, it's important to remember that the crypto market is highly volatile, and investors should always do their due diligence before making investment decisions. The future of Bitcoin and other cryptocurrencies remains uncertain, but the involvement of major financial institutions like BlackRock signals a promising future for these digital assets.
FAQ
What is BlackRock's recent move in the crypto space? BlackRock, the world's largest asset manager, has filed for permission to create a "spot market" Bitcoin-based exchange-traded fund (ETF).
How could BlackRock's Bitcoin ETF impact Bitcoin's price? The creation of a Bitcoin ETF by BlackRock could potentially increase demand for Bitcoin. Given Bitcoin's fixed supply limit, this could lead to a supply-demand imbalance and potentially drive up Bitcoin's price.
What role do retail investors play in the Bitcoin market? Retail investors play a significant role in the Bitcoin market. Their participation could lead to increased liquidity and could serve as a counterbalance to the large trades made by institutional investors.
Could BlackRock's Bitcoin ETF stabilize Bitcoin's price? The entry of BlackRock and other major asset managers into the Bitcoin space could potentially stabilize Bitcoin's price at a substantially higher level than the current one. However, long-term price stability also requires broad retail participation.
That's all for today
If you want more, be sure to follow us on:
NOSTR: croxroad@getalby.com
Instagram: @croxroadnews.co
Youtube: @croxroadnews
Store: https://croxroad.store
Subscribe to CROX ROAD Bitcoin Only Daily Newsletter
https://www.croxroad.co/subscribe
DISCLAIMER: None of this is financial advice. This newsletter is strictly educational and is not investment advice or a solicitation to buy or sell any assets or to make any financial decisions. Please be careful and do your own research.
-
-
@ 8fb140b4:f948000c
2023-11-18 23:28:31Chef's notes
Serving these two dishes together will create a delightful centerpiece for your Thanksgiving meal, offering a perfect blend of traditional flavors with a homemade touch.
Details
- ⏲️ Prep time: 30 min
- 🍳 Cook time: 1 - 2 hours
- 🍽️ Servings: 4-6
Ingredients
- 1 whole turkey (about 12-14 lbs), thawed and ready to cook
- 1 cup unsalted butter, softened
- 2 tablespoons fresh thyme, chopped
- 2 tablespoons fresh rosemary, chopped
- 2 tablespoons fresh sage, chopped
- Salt and freshly ground black pepper
- 1 onion, quartered
- 1 lemon, halved
- 2-3 cloves of garlic
- Apple and Sage Stuffing
- 1 loaf of crusty bread, cut into cubes
- 2 apples, cored and chopped
- 1 onion, diced
- 2 stalks celery, diced
- 3 cloves garlic, minced
- 1/4 cup fresh sage, chopped
- 1/2 cup unsalted butter
- 2 cups chicken broth
- Salt and pepper, to taste
Directions
- Preheat the Oven: Set your oven to 325°F (165°C).
- Prepare the Herb Butter: Mix the softened butter with the chopped thyme, rosemary, and sage. Season with salt and pepper.
- Prepare the Turkey: Remove any giblets from the turkey and pat it dry. Loosen the skin and spread a generous amount of herb butter under and over the skin.
- Add Aromatics: Inside the turkey cavity, place the quartered onion, lemon halves, and garlic cloves.
- Roast: Place the turkey in a roasting pan. Tent with aluminum foil and roast. A general guideline is about 15 minutes per pound, or until the internal temperature reaches 165°F (74°C) at the thickest part of the thigh.
- Rest and Serve: Let the turkey rest for at least 20 minutes before carving.
- Next: Apple and Sage Stuffing
- Dry the Bread: Spread the bread cubes on a baking sheet and let them dry overnight, or toast them in the oven.
- Cook the Vegetables: In a large skillet, melt the butter and cook the onion, celery, and garlic until soft.
- Combine Ingredients: Add the apples, sage, and bread cubes to the skillet. Stir in the chicken broth until the mixture is moist. Season with salt and pepper.
- Bake: Transfer the stuffing to a baking dish and bake at 350°F (175°C) for about 30-40 minutes, until golden brown on top.
-
@ 8cb60e21:5f2deaea
2024-08-24 23:07:08 -
@ 8fb140b4:f948000c
2023-11-02 01:13:01Testing a brand new YakiHonne native client for iOS. Smooth as butter (not penis butter 🤣🍆🧈) with great visual experience and intuitive navigation. Amazing work by the team behind it! * lists * work
Bold text work!
Images could have used nostr.build instead of raw S3 from us-east-1 region.
Very impressive! You can even save the draft and continue later, before posting the long-form note!
🐶🐾🤯🤯🤯🫂💜
-
@ 8cb60e21:5f2deaea
2024-08-24 21:27:00 -
@ fa0165a0:03397073
2023-10-06 19:25:08I just tested building a browser plugin, it was easier than I thought. Here I'll walk you through the steps of creating a minimal working example of a browser plugin, a.k.a. the "Hello World" of browser plugins.
First of all there are two main browser platforms out there, Chromium and Mozilla. They do some things a little differently, but similar enough that we can build a plugin that works on both. This plugin will work in both, I'll describe the firefox version, but the chromium version is very similar.
What is a browser plugin?
Simply put, a browser plugin is a program that runs in the browser. It can do things like modify the content of a webpage, or add new functionality to the browser. It's a way to extend the browser with custom functionality. Common examples are ad blockers, password managers, and video downloaders.
In technical terms, they are plugins that can insert html-css-js into your browser experience.
How to build a browser plugin
Step 0: Basics
You'll need a computer, a text editor and a browser. For testing and development I personally think that the firefox developer edition is the easiest to work with. But any Chrome based browser will also do.
Create a working directory on your computer, name it anything you like. I'll call mine
hello-world-browser-plugin
. Open the directory and create a file calledmanifest.json
. This is the most important file of your plugin, and it must be named exactly right.Step 1: manifest.json
After creation open your file
manifest.json
in your text editor and paste the following code:json { "manifest_version": 3, "name": "Hello World", "version": "1.0", "description": "A simple 'Hello World' browser extension", "content_scripts": [ { "matches": ["<all_urls>"], "js": ["hello.js"] //The name of your script file. // "css": ["hello.css"] //The name of your css file. } ] }
If you wonder what the
json
file format is, it's a normal text file with a special syntax such that a computer can easily read it. It's thejson
syntax you see in the code above. Let's go through what's being said here. (If you are not interested, just skip to the next step after pasting this we are done here.)manifest_version
: This is the version of the manifest file format. It's currently at version 3, and it's the latest version. It's important that you set this to 3, otherwise your plugin won't work.name
: This is the name of your plugin. It can be anything you like.version
: This is the version of your plugin. It can be anything you like.description
: This is the description of your plugin. It can be anything you like.content_scripts
: This is where you define what your plugin does. It's a list of scripts that will be executed when the browser loads a webpage. In this case we have one script, calledhello.js
. It's the script that we'll create in the next step.matches
: This is a list of urls that the script will be executed on. In this case we have<all_urls>
, which means that the script will be executed on all urls. You can also specify a specific url, likehttps://brave.com/*
, which means that the script will only be executed on urls that start withhttps://brave.com/
.js
: This is a list of javascript files that will be executed. In this case we have one file, calledhello.js
. It's the script that we'll create in the next step.css
: This is where you can add a list of css files that will be executed. In this case we have none, but you can add css files here if you want to.//
: Text following these two characters are comments. They are ignored by the computer, You can add comments anywhere you like, and they are a good way to document your code.
Step 2: hello.js
Now it's time to create another file in your project folder. This time we'll call it
hello.js
. When created, open it in your text editor and paste the following code:js console.log("Hello World!");
That's javascript code, and it's what will be executed when you run your plugin. It's a simpleconsole.log
statement, which will print the text "Hello World!" to the console. The console is a place where the browser prints out messages, and it's a good place to start when debugging your plugin.Step 3: Load and launch your plugin
Firefox
Now it's time to load your plugin into your browser. Open your browser and go to the url
about:debugging#/runtime/this-firefox
. You should see a page that looks something like this:Click the button that says "Load Temporary Add-on...". A file dialog will open, navigate to your project folder and select the file
manifest.json
. Your plugin should now be loaded and running.Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
Chrome
Open your browser and go to the url
chrome://extensions/
. Click the button that says "Load unpacked". A file dialog will open, navigate to your project folder and select the folderhello-world-browser-plugin
. Your plugin should now be loaded and running.Note the difference, of selecting the file
manifest.json
in firefox, and selecting the folderhello-world-browser-plugin
in chrome. Otherwise, the process is the same. So I'll repeat the same text as above: (for those who skipped ahead..)Go to a website, any website, and open the inspector then navigate to the console. You'll find the inspector by right-clicking anywhere within the webpage, and click "Inspector" in the drop-down menu. When opening the console you might see some log messages from the site you visited and... you should see the text "Hello World!" printed there, from our little plugin! Congratulations!
As you can see this isn't as complicated as one might think. Having preformed a "Hello-World!"-project is a very useful and valuable first step. These setup steps are the basics for any browser plugin, and you can build on this to create more advanced plugins.
-
@ 8cb60e21:5f2deaea
2024-08-24 00:10:45 -
@ 8fb140b4:f948000c
2023-08-22 12:14:34As the title states, scratch behind my ear and you get it. 🐶🐾🫡
-
@ 4c96d763:80c3ee30
2024-05-31 07:05:51Here's a quick script for generating git shortlog longform notes on git push. It currently powers the Damus Code nostr account:
Let's say you are hosting a bare git repository on a server at
git/project
. You can add apost-receive
hook that generates a longform note when you push to the server:In
server:git/project/hooks/post-receive
:```bash
!/usr/bin/env bash
commit_body="" last="" project="my-project" # update this with your project name sec="abcdef..." # update this with your secret key branch="master"
while read oldrev newrev refname; do branch=$refname last=$newrev relays="wss://relay.damus.io wss://nos.lol" commit_body=$(git shortlog $oldrev..$newrev | awk -f /home/user/markdown-shortlog.awk) done
if [[ $branch == "refs/heads/master" ]]; then
nostril --content "# Changes
$commit_body" \ --envelope \ --kind 30023 \ --tag title "$project" \ --tag summary "Latest codebase changes to $project" \ --tag t gitlog \ --sec $sec \ | nostcat --connect-timeout 1000 $relays fi ```
you'll need nostril, nostcat, and
markdown-shortlog.awk
:```awk /^[^ ]/ { if (author) { print "" } author = $0 print "## " author }
/^ / { print "-" substr($0, 6) } ```
Now when you push, it will generate a longform note that looks something like this:
Example
William Casarin (10):
- fix warnings
- readme: add usage
- textmode: fix coloring of abbreviated names
- profiling: update puffin version
- refactor: move note into its own widget
- refactor: rename widgets to ui
- ui: simplify note widget
- get all missing ids from all timelines
- initial inline note previews
- fix until filters
kernelkind (6):
- Add custom visual themes
- Add modular custom text styles
- Apply app style to AccountLoginView
- Add MobileAccountLoginView
- Refactor 'ui tests' conception to previews
- Use custom style in app
-
@ 8cb60e21:5f2deaea
2024-08-22 22:06:11 -
@ 8fb140b4:f948000c
2023-07-30 00:35:01Test Bounty Note
-
@ f77dfdcf:17e93422
2024-05-29 04:06:39Proof of Work เป็น concept ที่คนที่เคยศึกษาการทำงานของ bitcoin อาจจะเคยได้ยินผ่านหูมาบ้าง แต่จริง ๆ แล้ว สิ่งนี้สามารถนำมาประยุกต์ใช้กับชีวิตประจำวันของเราได้อย่างเป็นธรรมชาติมาก
Proof of Work สำหรับ bitcoin เอาแบบสั้น ๆ คือ การที่เราเจอ ตัวเลขที่ถูกต้อง (Proof) ซึ่งได้จากการขุด ที่จะเกิดขึ้นได้โดยการใช้พลังงานและเวลาของเครื่องขุดในการคำนวณตัวเลข (Work)
ยิ่งมี Proof of Work ใน chain เยอะขึ้น ก็ทำให้ transaction มี confirmation มากขึ้น
ถ้าจะให้เขียนให้ครบจบตรงนี้ คนอ่านน่าจะตาลอย แนะนำให้ลองอ่านต่อใน Inventing Bitcoin ดูครับ
พอเราซูมออกมาเป็นภาพกว้าง ๆ Proof of Work จะหมายถึง “หลักฐาน” ที่เกิดขึ้น จากการทำ “งาน”
งาน (Work)ในที่นี้ คือ การลงทุนทาง “เวลา” ไปกับการทำส่ิง ๆ หนึ่ง ซึ่งจะได้ผลตอบแทนเป็น Proof of Work ในรูปแบบใดรูปแบบหนึ่ง
Proof ที่พูดถึง ไม่จำเป็นต้องเป็นชิ้นงานที่มองเห็นหรือจับต้องได้ มันอาจจะหมายถึงทักษะ ความรู้ หรือ ประสบการณ์ ก็ได้
ตัวอย่างในชีวิตประจำวันชัด ๆ เลยก็อย่างเช่น
- การที่บางคนที่มีหุ่นดี สุขภาพแข็งแรง มีกล้ามเนื้อกำยำ ก็เป็น Proof of Work ของการออกกำลังกาย กินอาหารที่ดี และความมีวินัย
- การที่เราเรียนรู้เรื่องใหม่ ๆ แล้วเรารู้สึกว่ายังไม่แน่ใจกับสิ่งที่รู้ เราเลยศึกษาเพิ่ม สิ่งนี้ก็เป็นการเพิ่ม Proof of Work ตัวเรา ซึ่งคือ knowledge ของสิ่งนั้น ทำให้เรามั่นใจในองค์ความรู้นั้น ๆ มากขึ้น และสามารถนำไปส่งมอบ valueให้กับคนอื่น ๆ ได้
- หรือจะเป็นการฝึกทักษะการทำงาน ถ้าเรารู้ว่ายังไม่เก่ง Work ที่เราจะทำเพิ่ม ก็คือการหมั่นฝึกฝน และ Proof of Work ที่ได้ คือ ทักษะที่ดีขึ้นของเรา พอมองแบบนี้ เราจะชั่งน้ำหนักได้ง่ายขึ้น ว่าเราอยากจะลงทุนเวลาของเราไปกับ Proof of Work แบบไหน เพราะทุกคนย่อมอยากได้ผลตอบแทนที่คุ้มค่าจากการลงทุน
แต่มันมีข้อสังเกตอยู่อย่างหนึ่ง คือ เราต้องมองให้ออก ว่าอะไรเป็น Proof of Work จริง ๆ ของแต่ละสิ่ง
อย่างบางที เราบอกว่า เราเข้าใจเรื่องนี้นะ เพราะเราเคยเรียนคลาสนี้มา และเราอาจจะคิดว่าเอารูปถ่ายหรือประกาศนีย์บัตรมันเป็น Proof of Work ได้ แต่จริง ๆ แล้วไม่น่าใช่ มันคือ Proof of อะไรไม่รู้
อ่ะ ๆ มันอาจจะเป็น Proof ว่าเราเคยไปเรียนมาจริง อันนี้ยอมรับได้ แต่ไม่ใช่ว่ามันจะเป็น Proof ว่าเราเข้าใจเรื่องนั้นได้โดยตรง
เพราะ Proof ของ Work ที่เรากำลังพูดถึง มันคือ knowledge ที่อยู่ในหัวเรา ถ้าเราอยากโชว์ว่ามี Proof of Work จริง ๆ เราต้องเอาสิ่งที่ได้เรียนรู้ มาแชร์ให้คนอื่นฟังได้
และสังเกตดี ๆ จะเห็นว่า Proof of Work ที่ได้พวกนี้ มันเป็นสิ่งที่จะติดไปกับตัวเราทั้งหมดเลย มันจึงเกิดเป็น quote ที่ว่า
“You are your Proof of Work”
ซึ่งสื่อว่า สิ่งที่เราเป็น ล้วนเป็น Proof of Work มาจากสิ่งที่เราทำทั้งสิ้น และยิ่งเรามี Proof of Work เยอะขึ้น เราก็จะยิ่งเติบโตขึ้นเรื่อย ๆ
บางทีเราสามารถมองได้ด้วยตาเปล่าด้วยซ้ำ ว่าใครมี Proof of Work ที่มากหรือน้อย เพราะมันจะมันสะท้อนออกมาในรูปแบบของความมั่นใจ
พอรู้จักสิ่งที่เรียกว่า Proof of Work แล้ว สุดท้าย เราต้องกลับมาถามตัวเอง ว่าสิ่งที่เราทำอยู่ มันกำลังให้อะไรกับเรา กำลังสอนอะไรกับเรา หรือมันจะมอบ Proof of Work ที่เราต้องการ สำหรับเป้าหมายของเราในอนาคตหรือเปล่า
พิจารณามันให้ดี และอย่าลืม
หมั่นสร้าง Proof of Work ให้กับตัวเอง
Reference
https://youtu.be/E0LYMhjHnBU?si=AY6ySrTy5t-OgYFT
-
@ 7bdef7be:784a5805
2024-05-28 13:47:50I wrote Oracolo (see the announcement below) because I was brainstorming about Nostr "long format" and thinking about how to promote it. There seems to be little love for this format, why?
Long posts should have interesting value because the author usually put effort into them, and are produced for a long-term fruition. In the end, blogging was one of the most productive strands on the web, and still holds considerable importance.But in standard (kind-1) social clients they are rather hidden. I think many people don't even know they exist, they probably intuit something just because they see a particular formatting. This is quite evident if you compare the responses/zaps/reactions of the short notes with the long ones, the latter have far fewer interactions, a fact that I read as less exposure to readers.
Interlude: don't know what this "long format" stuff is?
Check https://habla.news or https://highlighter.comI think the situation can be largely improved with some adjustments in kind-1 clients:
- Add a tab/section to the user's profile, next to the usual posts/responses, that lists only the long format notes;
- Highlight/pinning recent long notes in the user's profile to give them visibility; the user picture could also have a special mark that alerts about fresh content available;
- In the feed show the preview of long notes with a special design, and allow the user to read them in a separate/immersive view (or just link to njump.me);
- In an appropriate context (es. at the footer of a long note) invite the user to discover long format and post his own content;
- Offer a filtered feed that display only long format notes;
Finally, we should probably also evaluate and agree on a new labeling in clients, because “long notes” is self-explanatory but also a bit confusing next to "plain notes”. Perhaps “articles” might be a better term.
If clients bring more interaction on articles, content creators are naturally incentivized to invest their time in this area, thus increasing the production of in-depth content that may be of interest even to those who are not as involved in social media dynamics.
Memo for kind-1 clients: interoperability is our superpower and currently your are the main entrance to Nostr, so don't be fearful or lazy, please embrace it.
nostr:nevent1qqsrrcl7sfaxd505lyezj7u54tpdg93x0swpcpe0xj5adax5l6xz3yspzamhxue69uhky6t5vdhkjmn9wgh8xmmrd9skctcpr3mhxue69uhkxmm4de68y6t9wvhxv6tpw34xze3wvdhk6tcppemhxue69uhkummn9ekx7mp0aagyzp
nostrdesign
-
@ 03742c20:2df9aa5d
2024-10-18 08:05:37Strfry เป็นซอฟต์แวร์รีเลย์ที่ส่วนใหญ่เลือกจะติดตั้งใช้งานงานกันเนืองจากมันถูกเขียนด้วยภาษา C++ ทำให้รีเลย์มีขนาดที่เบาไม่กินทรัพยากรเครื่องมากอีกข้อดีคือรองรับ nip เยอะพอสมควร
ถ้าเราอยากจะเป็นเจ้ารีเลย์ Strfry บ้างล่ะต้องทำยังไง
วิธีติดตั้งรีเลย์ Strfry โดยใช้ Docker
อย่าลืมติดตั้ง Docker ให้เรียบร้อยก่อน
ดาวน์โหลดไฟล์ strfry.conf และโฟรเดอร์ strfry-db
git clone https://github.com/notoshi404/nostr-relay-docker.git
cd nostr-relay-docker/strfry
แก้ไขไฟล์ strfry.confsudo nano strfry.conf
``` . . relay { # Interface to listen on. Use 0.0.0.0 to listen on all interfaces (restart required) bind = "0.0.0.0"# Port to open for the nostr websocket protocol (restart required) port = 7777 # Set OS-limit on maximum number of open files/sockets (if 0, don't attempt to set) (restart required) nofiles = 0 # HTTP header that contains the client's real IP, before reverse proxying (ie x-real-ip) (MUST be all lower-case) realIpHeader = "" info { # NIP-11: Name of this server. Short/descriptive (< 30 characters) name = "strfry" # NIP-11: Detailed information about relay, free-form description = "This is a strfry instance." # NIP-11: Administrative nostr pubkey, for contact purposes pubkey = "[Public_Key(hex)]" # NIP-11: Alternative administrative contact (email, website, etc) contact = "" # NIP-11: URL pointing to an image to be used as an icon for the relay icon = "" # List of supported lists as JSON array, or empty string to use default. Example: [1,2] nips = "" }
. . ```
docker-compose.yaml
services: strfry: container_name: strfry image: notoshi/strfry # original dockurr/strfry ports: - 7777:7777 volumes: - ./strfry-db:/app/strfry-db - ./strfry.conf:/etc/strfry.conf
docker pull notoshi/strfry
docker compose up -d
เพียงเท่านี้เราก็ได้รีเลย์แล้วถ้าใครอยากเปิดเป็น public ให้เพื่อน ๆ ใช้ด้วยอย่าลืมทำ proxy ใน nginx หรือใครไม่มี publicIP ก็ใช้ cloudflare tunnel ช่วยได้
มีข้อมูลจุดไหนผิดพลาดต้องขออภัยไว้ ณ ที่นี้ด้วยช่วยเสริมพูดคุยกันได้
หวังว่าบทความนี้จะเป็นประโยชน์ แล้วเจอกันใหม่ในครั้งจะพาทำเรื่องอะไรนั้นรอติดตามกัน
NOT YOUR RELAY NOT YOUR DATA
siamstr #nostr #relay
-
@ 8cb60e21:5f2deaea
2024-08-21 21:37:35 -
@ 8cb60e21:5f2deaea
2024-08-21 21:37:35hello world
-
@ 8fb140b4:f948000c
2023-07-22 09:39:48Intro
This short tutorial will help you set up your own Nostr Wallet Connect (NWC) on your own LND Node that is not using Umbrel. If you are a user of Umbrel, you should use their version of NWC.
Requirements
You need to have a working installation of LND with established channels and connectivity to the internet. NWC in itself is fairly light and will not consume a lot of resources. You will also want to ensure that you have a working installation of Docker, since we will use a docker image to run NWC.
- Working installation of LND (and all of its required components)
- Docker (with Docker compose)
Installation
For the purpose of this tutorial, we will assume that you have your lnd/bitcoind running under user bitcoin with home directory /home/bitcoin. We will also assume that you already have a running installation of Docker (or docker.io).
Prepare and verify
git version - we will need git to get the latest version of NWC. docker version - should execute successfully and show the currently installed version of Docker. docker compose version - same as before, but the version will be different. ss -tupln | grep 10009- should produce the following output: tcp LISTEN 0 4096 0.0.0.0:10009 0.0.0.0: tcp LISTEN 0 4096 [::]:10009 [::]:**
For things to work correctly, your Docker should be version 20.10.0 or later. If you have an older version, consider installing a new one using instructions here: https://docs.docker.com/engine/install/
Create folders & download NWC
In the home directory of your LND/bitcoind user, create a new folder, e.g., "nwc" mkdir /home/bitcoin/nwc. Change to that directory cd /home/bitcoin/nwc and clone the NWC repository: git clone https://github.com/getAlby/nostr-wallet-connect.git
Creating the Docker image
In this step, we will create a Docker image that you will use to run NWC.
- Change directory to
nostr-wallet-connect
:cd nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - The last line of the output (after a few minutes) should look like
=> => naming to docker.io/library/nwc:latest
nwc:latest
is the name of the Docker image with a tag which you should note for use later.
Creating docker-compose.yml and necessary data directories
- Let's create a directory that will hold your non-volatile data (DB):
mkdir data
- In
docker-compose.yml
file, there are fields that you want to replace (<> comments) and port “4321” that you want to make sure is open (check withss -tupln | grep 4321
which should return nothing). - Create
docker-compose.yml
file with the following content, and make sure to update fields that have <> comment:
version: "3.8" services: nwc: image: nwc:latest volumes: - ./data:/data - ~/.lnd:/lnd:ro ports: - "4321:8080" extra_hosts: - "localhost:host-gateway" environment: NOSTR_PRIVKEY: <use "openssl rand -hex 32" to generate a fresh key and place it inside ""> LN_BACKEND_TYPE: "LND" LND_ADDRESS: localhost:10009 LND_CERT_FILE: "/lnd/tls.cert" LND_MACAROON_FILE: "/lnd/data/chain/bitcoin/mainnet/admin.macaroon" DATABASE_URI: "/data/nostr-wallet-connect.db" COOKIE_SECRET: <use "openssl rand -hex 32" to generate fresh secret and place it inside ""> PORT: 8080 restart: always stop_grace_period: 1m
Starting and testing
Now that you have everything ready, it is time to start the container and test.
- While you are in the
nwc
directory (important), execute the following command and check the log output,docker compose up
- You should see container logs while it is starting, and it should not exit if everything went well.
- At this point, you should be able to go to
http://<ip of the host where nwc is running>:4321
and get to the interface of NWC - To stop the test run of NWC, simply press
Ctrl-C
, and it will shut the container down. - To start NWC permanently, you should execute
docker compose up -d
, “-d” tells Docker to detach from the session. - To check currently running NWC logs, execute
docker compose logs
to run it in tail mode add-f
to the end. - To stop the container, execute
docker compose down
That's all, just follow the instructions in the web interface to get started.
Updating
As with any software, you should expect fixes and updates that you would need to perform periodically. You could automate this, but it falls outside of the scope of this tutorial. Since we already have all of the necessary configuration in place, the update execution is fairly simple.
- Change directory to the clone of the git repository,
cd /home/bitcoin/nwc/nostr-wallet-connect
- Run command to build Docker image:
docker build -t nwc:$(date +'%Y%m%d%H%M') -t nwc:latest .
(there is a dot at the end) - Change directory back one level
cd ..
- Restart (stop and start) the docker compose config
docker compose down && docker compose up -d
- Done! Optionally you may want to check the logs:
docker compose logs
-
@ 6ad08392:ea301584
2024-05-27 18:31:39Release announcement & short overview
Two years, six drafts, and 125,000 words later, and The Bushido of Bitcoin is almost complete.
Before the book’s release in Q3 of this year I will be doing a few things:
- Making it available for pre-order on Geyser. For the general paperback, digital and audio copies, it will save you roughly 50%. I will also include some limited edition options, like a short run of 21 leather-bound versions of the book. More on that in the coming weeks.
- Drip-feeding snippets from the book, in the form of quotes, lessons, etymology progressions and insights, across all my socials. On Substack I’ll do longer form posts, on Twitter & Nostr, I’ll keep them more succinct, and finally, I’m reviving my Instagram to wrap the insights in beautiful, shareable, bite-size visuals.
- Jumping on a bunch of podcasts, both Bitcoin and not Bitcoin-related to dig into the content of the book. I’ve recorded with Breedlove already. Many more to come - and who knows, I may even revive my old Wake Up Podcast and do a few short episodes there too.
I want to treat this book as both an ongoing work and a piece of art. So alongside the book, I’m also going to produce some pieces of visual and physical art. The video trailer, alone, I promise will blow your mind., as will the warrior-samurai artwork I’m going to have commissioned in collaboration with some soon-to-be-announced artists. I’ll probably even do a tradings cards pack with Bitcoin Trading cards next year, and some other collaborations along the way.
In any case, it’s been an incredible journey writing this book and I’m honoured to have had people like John Carter help me edit it, and Ross Stevens agreeing to do the foreword. I can’t wait to have the final version completed and in your hands.
For those who might be wondering what I am talking about…
**What is The Bushido of Bitcoin? **
This is a book I’ve been writing for almost two years now. Its genesis was a conversation I had with Erik Cason on my old Wake Up Podcast - also called “The Bushido of Bitcoin.” It was Episode 65: you can check out here. The inspiration for that episode came from a shared love of the book by James Clavell, called: Shogun (now a HBO series - which it seems they didn’t make woke..thank God), and of course we related the idea of Bushido (Way of the warrior: Code of Virtue) back to Bitcoin.
I felt that this was a seed of an idea, well worth watering. So after that, I decided to go on a history binge and start collecting ideas. What ensued was a real journey. I must’ve listened to a thousand hours of history books and Dan Carlin podcasts in the first six months and the concept began to form. But before I tell you what the concept is - let me tell you what it’s not.
This is NOT another book about the history of money, nor does it make an Austrian case for sound money, or an economic case for Bitcoin as sound money. Neither is it concerned with how Bitcoin works, or any of the technicals. We have enough of those books, and I don’t think I will add anything new to that corpus of knowledge. What this book IS about, is something so much deeper and more profound: The behaviour, virtue, culture and civilisation of greatness.
The book seeks to answer the question: “What happens when Bitcoin wins?” What happens to those who rise to the top, and become the socio-economic elite of the world?
- Will we become a new parasitic class?
- Will we become self-indulgent degenerates? Or..
- Will become men and women of virtue?
The latter is not a given, and it’s certainly not enough to just say “Bitcoin Fixes This.” To become men and women of stature and character requires actively developing the virtues which give rise to a culture of excellence. This is the only way to reclaim and rebuild civilisation - complaining and wishing about the past won’t cut it.
Over the coming weeks, I will introduce you to the Ten Virtues that make up The Bushido of Bitcoin. The book of course is more complete, but I will hold nothing back. We’ll follow the historical and etymological genesis of these virtues with an in-depth analysis on how they were embodied by the greatest leaders and warriors throughout history. We’ll also draw lessons from this analysis that will help us navigate the road ahead.
What lies before us may be a “clown world” but hope is far from lost. We’ve been here before. Many times, and against greater odds. This is our generation’s opportunity for a re-conquista.
The Bushido of Bitcoin is written to remind you there is something greater inside of you, and the only way through hell, is forward. I hope you find value in the up-coming content, and that should you pick up a copy of the book, it greatly inspires you.
Thankyou Aleksandar Svetski
Per-order the book here: https://geyser.fund/project/bushidoofbitcoin Get a free introductory chapter here: BushidoOfBitcoin.com Follow my work here: Linktree.com/Svetski
-
@ 81870f53:29bef6a6
2024-10-18 07:55:09<ここがポイント!>
■需給の変化が生み出す金の価格変動 ■米ドル金利が低下すると、金や暗号資産は上昇しやすい ■投資全体のバランサーとしての役割は重要
需給の変化が生み出す金の価格変動 金や暗号資産は、一部の機関投資家が「投資」対象としてして認知しており、「投資機会」ではある。ただし、人間が努力と工夫を通じて価値を生み出す株式への投資とは投資の意味が異なることを理解する必要がある。長期投資の対象として、金や原油といった商品、暗号資産は、運用資産全体のバランスを取るという程度と理解するのが適切だ。
金については、長らくヒトが保有したいモノとして認識されてきた。光り輝く見栄えのみではなく、さびない、劣化しないといった特質から、ヒトが未来においても欲するであろう価値を物質的に維持できるというまれな性質を持っている。金が貨幣として使われるのも当然であった。しかし、金融恐慌での失敗から、経済運営を金のようなモノの量で制約してしまう金本位制は廃止された。それ以来、金は主に嗜好品としての価値を基礎とするようになった。
加えて、米ドル建て金価格の近年の上昇は、中国やロシアの中央銀行の外貨準備としての金の買い付けという現物への強い需要に支えられている。これは最近始まったことではなく、ロシアや中国などの中央銀行は淡々と機械的に買い付けしているようみえるし、過去にはこの買い付けが金先物価格に影響を与えたとは言いがたかった。
ところが、中国やロシアと米国との対立の深まりが、中国やロシアの米ドルから金への外貨準備シフトのニーズを高めることになった。これによって金現物の需要が増し、価格上昇への期待も増すことになる。逆にこのようなニーズがいつまであるか分からないし、地政学リスクとは関係なく、中央銀行が必要な規模を保有すれば需要が低迷する恐れもある。したがって、金価格は需給で決まることに変わりはない。
米ドル金利が低下すると、金や仮想通貨は上昇しやすい ただし、金は金融取引としても重要な意味を持つ。米ドル建ての金価格は、米国経済が悪いとき、具体的には米ドル金利が物価上昇率に比べて低いとき、相対的に高くなりやすい。金利が低いときには、価値保全が期待できる金の相対的魅力が増す。経済が悪化する場合、紙幣よりも金のほうが安心感も増す。
ただし、金融取引対象としての金は、金利や配当など新しい価値を生み出さないことに注意したい。経済が価値を生み出す順調なときには、インフレ率や金利は高くなりやすく、金の価値は相対的に低くなりやすい。金取引は、人間の努力や工夫が実を結び、配当などを通じて保有者に分配される仕組みではない。その価格は、買う人が欲しいと思う需要側の価格と、掘り出すコストおよび保管コストに依存する供給側の価格との需給のみによって支配される。
ニューヨーク商品取引所などでの金融取引対象としての金の先物取引は、宝飾品などとしての現物の取引量を圧倒的に凌駕しており、金先物価格は、採掘コストのインフレによる上昇などをある程度考慮しながらも、米ドル金利で示されるインフレ期待や、米国株式のPER(株価収益率)に示される市場のリスク認識への依存度が高い。
投資対象としての暗号資産も、基本的に金と似ている。暗号資産は、その価値の構成要素はさまざまだが、いずれも米ドルに対する代替とみなすことができる。有名なビットコインの場合、金と同様にマイニング(採掘)コストをもって基礎的な供給側の価格を提示させ、保有したい人の需要の変化が価格を動かす。そもそも送金や決済コストの低さが魅力ではあるが、現時点でそのような需要が価格に与える影響はさほど大きくないようだ。
暗号資産に前向きでなかったトランプ前大統領は暗号資産業界を支援すると表明したが、これが長期的な暗号資産の価値増加につながるとは見ていない。彼の目的の一つは、暗号資産そのものではなく、暗号資産業界から資金的な支援を受けるためのようにみえ、これは投資家にとって本質的ではない。
もう一つは、米共和党保守派に根強くある中央銀行に対する不信であるが、こちらはそう簡単に中央銀行が暗号資産を外貨準備にする需要が高まるとは考えにくい。トランプ前大統領が表明した暗号資産への規制緩和などは、これから伸びる産業であるという期待とともに、中央銀行などの政策介入を嫌う自由主義の考え方にも押されている。
政治的な支援は、暗号資産の利用者を増やすことで一時的に需要増に寄与する面もあるかもしれないが、長期的にゆがんだ需要はいずれ正されるので、価格を引き上げる理由ではない。自由化が進めば先物市場も発達し、空売りも簡単になるかもしれない。
投資全体のバランサーとしての役割は重要 証券投資、特に株式投資が投資である理由は、人間の経済活動を支えるメカニズムの下で、人間の努力と工夫の成果を投資家に還元するメカニズムであるからだ。これとの比較でみれば、金や暗号資産などへの「投資」は、単なる需給による価格変化、金利やインフレ率の変化による相対的な価値の変化に立ち向かうのだから、投資というよりも賭け事に近いといえる。
とはいえ、多くの機関投資家が金、銅、小麦、原油などを投資対象とする理由は、リスク分散に寄与するからである。仮に金や原油、暗号資産が、需給以外の変動理由がない(人間の営みのような付加価値を生み出す仕組みに裏打ちされない)という意味で期待リターンがゼロであったとしても、簡単に取引に参加でき、安心できる制度の中で、透明性の高い価格で取引されるのであれば、証券投資とのリターンの相関が低いことで、投資全体のリスクを下げるバランサーの役割を果たすことができる。
理論的な説明は省くが、例えば、株式と債券をバランスよく持つ投資では、株式は人々の創意工夫の成果の配分、債券は約束された金利に基づく利息などの収入が見込まれる。しかし、例えば米国のインフレ率の下落により、米ドル金利低下と債券価格の下落がもたらされることもありうる。このような時には、金や暗号資産などの米ドル建て価格は上昇しやすくなるだろう。金を含む商品、暗号資産などを投資資産に含めることは、投資資産の価値の下落を一部カバーし(上昇を抑えることもあるが)、結果として資産全体のリスクを低減させ、リスクに見合う投資成果を高める効果が期待できるだろう。
-
@ d2e97f73:ea9a4d1b
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 25191283:a4823315
2024-08-21 13:37:49This is Olive Grove Eggs, a brand new site from Huevos del Olivar that's just getting started. Things will be up and running here shortly, but you can subscribe in the meantime if you'd like to stay up to date and receive emails when new content is published!
-
@ 362ebffa:492e2719
2024-05-27 12:51:14Consciousness is the subjective experience arising from the brain (as the viewer, the beholder) While reality encompasses both the objective external world and our subjective perception of it.
The two are deeply interconnected, with consciousness shaping our experience of reality and reality influencing the state and content of our consciousness.
Therefor we do live in various bubbles of reality, my reality (my perception of reality) is my own.
What do you think?
-
@ 2ecde0a6:10022dcb
2024-05-25 20:28:41Opinion about KeepKey (hardware)
KeepKey is a hardware wallet with a high level of security and supports more than 40 different crypto assets.
The device provides a PIN code and recovery seeds. It has a feature where it switches your PIN code numbers from time to time, making it impossible for malware to copy our code. Also, the device has a system for trade where you have to press and hold to confirm the transaction to avoid external hacks.
KeepKey has only one button to manage it. This button is used for turning the device on and off. All the other processes can be managed through the mobile app. That includes entering your PIN code and setting up the recovery seed, which makes it very simple to use, unlike other complex wallets. The device has a wide screen that allows you to see the entire cryptocurrency address without the need to scroll back and forth. But it's easy to break or scratch if you don't have a protecting casing.
Its price is around $80.
But you have to remember that the device is a little big and heavy, compared to other hard wallets, so it's difficult to carry around with it.
WalletScrutiny #nostrOpinion
-
@ 82341f88:fbfbe6a2
2023-04-11 19:36:53There’s a lot of conversation around the #TwitterFiles. Here’s my take, and thoughts on how to fix the issues identified.
I’ll start with the principles I’ve come to believe…based on everything I’ve learned and experienced through my past actions as a Twitter co-founder and lead:
- Social media must be resilient to corporate and government control.
- Only the original author may remove content they produce.
- Moderation is best implemented by algorithmic choice.
The Twitter when I led it and the Twitter of today do not meet any of these principles. This is my fault alone, as I completely gave up pushing for them when an activist entered our stock in 2020. I no longer had hope of achieving any of it as a public company with no defense mechanisms (lack of dual-class shares being a key one). I planned my exit at that moment knowing I was no longer right for the company.
The biggest mistake I made was continuing to invest in building tools for us to manage the public conversation, versus building tools for the people using Twitter to easily manage it for themselves. This burdened the company with too much power, and opened us to significant outside pressure (such as advertising budgets). I generally think companies have become far too powerful, and that became completely clear to me with our suspension of Trump’s account. As I’ve said before, we did the right thing for the public company business at the time, but the wrong thing for the internet and society. Much more about this here: https://twitter.com/jack/status/1349510769268850690
I continue to believe there was no ill intent or hidden agendas, and everyone acted according to the best information we had at the time. Of course mistakes were made. But if we had focused more on tools for the people using the service rather than tools for us, and moved much faster towards absolute transparency, we probably wouldn’t be in this situation of needing a fresh reset (which I am supportive of). Again, I own all of this and our actions, and all I can do is work to make it right.
Back to the principles. Of course governments want to shape and control the public conversation, and will use every method at their disposal to do so, including the media. And the power a corporation wields to do the same is only growing. It’s critical that the people have tools to resist this, and that those tools are ultimately owned by the people. Allowing a government or a few corporations to own the public conversation is a path towards centralized control.
I’m a strong believer that any content produced by someone for the internet should be permanent until the original author chooses to delete it. It should be always available and addressable. Content takedowns and suspensions should not be possible. Doing so complicates important context, learning, and enforcement of illegal activity. There are significant issues with this stance of course, but starting with this principle will allow for far better solutions than we have today. The internet is trending towards a world were storage is “free” and infinite, which places all the actual value on how to discover and see content.
Which brings me to the last principle: moderation. I don’t believe a centralized system can do content moderation globally. It can only be done through ranking and relevance algorithms, the more localized the better. But instead of a company or government building and controlling these solely, people should be able to build and choose from algorithms that best match their criteria, or not have to use any at all. A “follow” action should always deliver every bit of content from the corresponding account, and the algorithms should be able to comb through everything else through a relevance lens that an individual determines. There’s a default “G-rated” algorithm, and then there’s everything else one can imagine.
The only way I know of to truly live up to these 3 principles is a free and open protocol for social media, that is not owned by a single company or group of companies, and is resilient to corporate and government influence. The problem today is that we have companies who own both the protocol and discovery of content. Which ultimately puts one person in charge of what’s available and seen, or not. This is by definition a single point of failure, no matter how great the person, and over time will fracture the public conversation, and may lead to more control by governments and corporations around the world.
I believe many companies can build a phenomenal business off an open protocol. For proof, look at both the web and email. The biggest problem with these models however is that the discovery mechanisms are far too proprietary and fixed instead of open or extendable. Companies can build many profitable services that complement rather than lock down how we access this massive collection of conversation. There is no need to own or host it themselves.
Many of you won’t trust this solution just because it’s me stating it. I get it, but that’s exactly the point. Trusting any one individual with this comes with compromises, not to mention being way too heavy a burden for the individual. It has to be something akin to what bitcoin has shown to be possible. If you want proof of this, get out of the US and European bubble of the bitcoin price fluctuations and learn how real people are using it for censorship resistance in Africa and Central/South America.
I do still wish for Twitter, and every company, to become uncomfortably transparent in all their actions, and I wish I forced more of that years ago. I do believe absolute transparency builds trust. As for the files, I wish they were released Wikileaks-style, with many more eyes and interpretations to consider. And along with that, commitments of transparency for present and future actions. I’m hopeful all of this will happen. There’s nothing to hide…only a lot to learn from. The current attacks on my former colleagues could be dangerous and doesn’t solve anything. If you want to blame, direct it at me and my actions, or lack thereof.
As far as the free and open social media protocol goes, there are many competing projects: @bluesky is one with the AT Protocol, nostr another, Mastodon yet another, Matrix yet another…and there will be many more. One will have a chance at becoming a standard like HTTP or SMTP. This isn’t about a “decentralized Twitter.” This is a focused and urgent push for a foundational core technology standard to make social media a native part of the internet. I believe this is critical both to Twitter’s future, and the public conversation’s ability to truly serve the people, which helps hold governments and corporations accountable. And hopefully makes it all a lot more fun and informative again.
💸🛠️🌐 To accelerate open internet and protocol work, I’m going to open a new category of #startsmall grants: “open internet development.” It will start with a focus of giving cash and equity grants to engineering teams working on social media and private communication protocols, bitcoin, and a web-only mobile OS. I’ll make some grants next week, starting with $1mm/yr to Signal. Please let me know other great candidates for this money.
-
@ 6bae33c8:607272e8
2024-10-18 07:09:04I woke up this morning, and neither the 40-minute edited version, nor the five-minute highlights were ready yet. No chance I’m gonna spend 3.5 hours on the full game, fast forwarding through commercials with my imprecise and not-very-responsive Apple TV remote. Especially not for this game.
I’m a little annoyed I switched from the Broncos to the Saints in my home picking pool, but that’s more than offset by my starting Javonte Williams in one of the first-place BCL leagues at the last minute. Checked the box score, was like, “Hell yeah!” Imagine having left him on the bench in the hopes Rhamondre Stevenson might play or Bucky Irving would get enough carries!
-
I also picked up and used Mason Tipton for my Steak League team which lost Rashid Shaheed, has Chris Olave hurt and CeeDee Lamb on bye. That worked out too.
-
It was nice to see Alvin Kamara do nothing. There are a lot of teams that got off to fast starts with him in their lineups. What a contrast between this destroyed version of the Saints and the team that came out of the gates so quickly.
-
From the box score it looks like Spencer Rattler did a ton of dink and dunk, and took a bunch of sacks before getting hurt.
-
Bo Nix’s box score looks like something out of the 1960s. I have Courtland Sutton in the one bad BCL — had to use him with Shaheed out — and it’s just as well. I can bury that Christian McCaffrey team at the bottom of the ocean.
-
I don’t know what else to say about this game except that if your star corner (Patrick Surtain) had to miss a game, this was definitely the one to miss. And if the Game Pass had to be late in editing a game, it seems like this was a good one to miss too.I woke up this morning, and neither the 40-minute edited version, nor the five-minute highlights were ready yet. No chance I’m gonna spend 3.5 hours on the full game, fast forwarding through commercials with my imprecise and not-very-responsive Apple TV remote. Especially not for this game.
-
-
@ 765da722:17c600e6
2024-10-18 00:46:59*“‘Paul … set apart for the gospel of God … to bring about the obedience of faith for the sake of his name among all the nations, including you who are called to belong to Jesus Christ” *Romans 1:1-6.
“Are you a member of our rewards program?” the cashier asks me at whatever random store I am buying an item. Before I put my phone number into their machine to see, I ask what benefit I will reap for belonging. The poor young woman does not know. Perhaps she’s never been asked before. We just simply belong to things today, and the commitment is so low.
Sadly, this secular way of thinking has crept into the church. Both Satan and Jesus have been campaigning long for your vote. Your soul is at stake. The promises from the “father of lies” have proven to be empty while those of the One who embodies truth have proved to be “precious and very great.”
So, the next lie is that you “belong” to God with very little invested. The devil doesn’t stop us from going to Bible class or worship services when it’s convenient to us. Nor does he shake when we obey the gospel as he knows we won’t grow in our faith. Just as long as we’ll shrug at the pearly gates when asked if we belong.
Bible #commitment #belonging
-
@ 8cb60e21:5f2deaea
2024-08-18 22:20:04 -
@ 8cb60e21:5f2deaea
2024-08-18 21:01:07 -
@ bf95e1a4:ebdcc848
2024-10-15 12:24:45This is the full AI-generated transcript of Bitcoin Infinity Show #130 with Obi Nwosu!
If you'd like to support us, check out bitcoininfinityshow.com for all our books, merch, and more!
Welcoming Obi Nwosu
Luke: Obi, welcome for the first time to the Bitcoin Infinity Show.
Obi: well,
Knut: We rebranded.
Obi: what is time in infinity? No, no, it's the second time, great to have you back. yeah, we have, it's been a wild ride and the journey is just beginning. So yeah, thank you.
The Launch of Fedi
Knut: so Fedimin launched, two weeks ago. Is it the Fedi
Obi: Fedi, launched?
Knut: launched? Yeah. These terms.
Obi: no, no, Fedi Mint launched, effectively Fedi Mint launched nearly five years ago. FediMint is a very old technology, very, you know, the first, the first FediMint transaction, where someone used FediMint e cash over Lightning to buy a cup of coffee, which was after, you know, a year plus of development was on, I believe it was the 3rd of the 8th, 3rd of August, 2021.
Obi: And so we're trying to, like you have a Bitcoin Infinity Day, we're suggesting, that was actually Erik, my, the inventor of Fedi Mint. from Parinelli Police, just actually, and so I like to think of that as e cash coffee day. Cause actually it was like, you actually bought the cup of coffee with e cash.
Obi: so yeah, but yeah, Fedi finally launched two weeks ago.
Knut: All right. so I think, for those who haven't seen the previous episode with you, if they want to know more about you, we should probably go back to that episode, but I think you're going to have to do the TLDR on what Fedi is for our listeners. Like that's a good start, I think.
Obi: So yeah, and now we can be clear about what Fedi is. And so Fedi, is two things still. Even Fedi is two things. One is the company called Fedi and the other is this product called Fedi. So if we talk about the product that people have on their phone, Fedi is a community super app. And so it's an app that takes the best of freedom technology.
Obi: it's got Bitcoin functionality in it, Lightning connectivity, obviously FediMint for handling community custody. but it's also got Nostr support and any other freedom technology that's out there that's mature and reliable. We've taken the time to integrate into one simple to use app. So it allows you to have chat.
Obi: We use Matrix as this federated, decentralized, encrypted chat protocol. It has money with the combination of Lightning, Bitcoin, and Fediment and more. So it has a built in web browser inside it. And therefore you can access all of the Bitcoin ecosystem of apps from Bitrefill to Unleash. chat to BTCmaps and beyond.
Obi: All in one place. So you don't have to have this smorgasbord of different apps and tabs open one app to use them all. And the app itself, we announced as well, is now source available and will eventually be open source as well. So we're trying to make the best of it. portal into the freedom technology space.
Obi: So that's Fedi. And then Fedi the company builds the Fedi app. And we also have something we call the FedEye Order, which is, this selection of incredible people, FedEye Knights, who are on the ground and they, you can think of them as like a Decentralized genius bar. If you've got an iPhone, you have the genius bar that goes along with the phone.
Obi: The reason why the iPhone is so amazing is not just the phone, but it's also the incredible support you can get. If you can go to an Apple store and you go to the genius bar, they can help you. we have that instead of it being in, you know, Fifth Avenue or Oxford street in London or so on.
Obi: It's in, the capital of Togo or Uganda or. Guatemala, or so on. On the ground, they will locate communities, they will educate communities. and they will support communities on Bitcoin, on Lightning, on FediMent, on all of these different websites and services that are out there to provide that sort of support that's needed for the communities that are outside of the existing Bitcoin space.
How Federations Work
Knut: Okay, great. so how does a federation work?
Obi: so the first thing you have to do, wherever you custody is where you transact and do and you live and so on, which is why. Banks try very much when you're young to get you to hold a bank account with them because they know that most people never leave and then all other services are provided. So how do you actually custody?
Obi: For many people they've had two choices. Either they do everything themselves and that's the best if you can do it just like it's the best to be able to build and fix your own car or house but not everybody can do that but that is always the best because no one's going to love you. And put as much care in as yourself.
Obi: The other extreme is to fully outsource it, fully give it to some private party, which is actually what ends up 95 percent plus people doing, and that's putting their money on a Coinbase or some other centralized service. and the same with communication. They would use some sort of centralized service.
Obi: They would use a WhatsApp, an X. com, a Telegram, a WeChat or so on. They would use some centralized chat. And if you think about it. Our lives are communication and money and value. So both those things, most people outsource, some people take it in house. If I want to set up a federation, which is to do with the custody of the money, where FedeMint is this middle, middle house, I can find within my community, a number of trusted parties.
Obi: We call them guardians. So let's say. You found us three plus, you know, your great t shirt, Greg Voss. The minimum we suggest is four for various Esoteric reasons From a cryptographic security point of view we suggest four, but you can have seven You can have you can keep growing you could have we've seen people have seen Federation stood up with as many as 40 people in them And it will get slower and slower if it gets beyond that, but, but technically you can.
Obi: It'll be this, it'll create this huge multisig, i. e. multiple people have to sign before you do a transaction on chain. And so multisig starts to get expensive of a certain size. But let's say us three plus Greg. We would FedeMint software. we would download the 30 minute software onto a machine that we have spare, and we would set up and run it.
Obi: The setup process will, part of it will enter the information about the other three. And we make that very simple, it's a web interface, you point and click and you get a code and you share that code with the other parties, everybody shares the code of each other. Maybe you go into a group chat and paste each other's code.
Obi: Everybody copies each other's, enters it into our own FediMint and then they connect to each other and they form a federation. As long as you keep that box, running, connected to the internet, and connected to electricity, the federation, for each, all the four, the federation are one.
Obi: But because it's a federation, if one of them, for example, had a power cut, or lost their internet, or had to change their domain name, or something like that, The other three will be able to continue and operate. Yep, so you've now created this community custody platform. Now, anyone with the FEDI app or any other app that supports the FEDIMINT protocol, Webimint, and we're hoping that many others will set up FEDIMINT wallets, like there are multiple Lightning wallets in future.
Obi: Any FDI min wallet compatible wallets like Fedie, can connect to your federation At the end of setting up the fed min server will show a QR code and the string that represents how to connect to your Federation. So you could take your Fed app, or the Mutiny wallet, or Web Mint, or any other, fed mint compatible wallet, and you'll scan that QR code.
Obi: And you've now connected to that federation and that federation becomes, you can now use it to custody. Now, what will happen is, if for example, someone wants to send money to you, you would, just as if you're using a Bitcoin wallet, let's say it's on chain. you would say, I want to receive, enter the amount and it'll show a QR code.
Obi: Someone else who's using a normal Bitcoin wallet will scan that code and send over the Bitcoin main chain money to you. But what's actually happening is your Fediap is communicating with the Federation. Your Federation is creating a Bitcoin address for you to send to and sends it back to you for you to display.
Obi: Okay. And then a user, someone else who's using a completely different wallet will send money to that address. Actually goes to the federation and they, the four of us combined will process that and create e cash, which is like a token representation of the
Obi: Bitcoin. And then the e cash will be sent to you. But the way it, the way it's sent is completely privacy preserving. So the guardians have no way of knowing who they are providing that service for, who's receiving the money.
Obi: There's full privacy.
Obi: All right, and neither does the sender, I assume, like the sender doesn't, that they sent Bitcoin to us and address. They have no idea who, so if there are, let's say we set this up and we're using it for our friends and extended family and in total, there are 40 of us or 50 of us
Obi: When you send to that address, there's no way to know out of those 40 or 50 people who received it or who requested it.
Knut: All right, so, a bit about the guardians and the multisig, that's obviously because you don't want to have a single point of attack for each, federation, right?
Obi: point of failure,
Knut: A single point of
Obi: the more likely thing is that someone's machine, if you had one machine, the most likely thing that will happen, almost guaranteed, at some point you'll have some sort of power cut or internet cut. Internet cut is probably the most likely you'll, you'll have a glitch on your internet for 30 minutes.
Obi: If you do, Everyone using your federation won't be able to use your system for 30 minutes.
Knut: but it's also an attack vector. Like if the, if the, if there's a lot of money in the federation and, so there's, there's an incentive to attack the guardians. Like, can you be completely sure that the guardians don't know each other's identities and stuff like that? Like how, I know you think a lot about the attack vector.
Knut: So I'm like, can you go into that a bit?
Obi: can't be completely sure of anything in life. So the answer to that is automatically no. Can you be completely sure of something? but, it depends on the Also, there's an assumption that you have, that the people don't know each other. Cause I think very often in, there's two types of scenarios.
Obi: It could be that each party completely doesn't know each other, or the more common scenario will be that you're some community or some group of friends. And within you, you've decided. Of the people who are my friends and family and so on, these four people are the ones who are consistently the most reliable, the most trusted and so on.
Obi: They do know each other, and you know who they are, and it's because you know who they are that you're comfortable with them holding. they're the Uncle Jims of the family. they're known to be reliable. They're known to be people who care about their friends and family.
Obi: that's very often actually what we're seeing is the more common scenario than the ones where people are completely, anonymous to each other. But as it matures, we may see the other scenario happen as well.
The Uncle Network
Luke: It's a literal uncle network. I know Uncle Rockstar started the uncle network here on infinity day. Yeah, you got the brother Luke, and so that's four, so we're
Obi: are you an uncle?
Knut: am an uncle officially now.
Knut: an uncle as well, are like, but dubbed by Uncle Rockstar
Obi: I haven't been dubbed I, so
Obi: you are a good candidate. candidate, but I am biologically now, an
Knut: oh, congratulations,
Obi: Yeah,
How Fedi Launched
Luke: Okay, well, I think we are looking just to dig in more about Fedi Fedi Mint and, what does your launch actually mean? Because the app has been in beta for quite a while, right? what's happened, to make it that you can launch?
Obi: Yeah, that's a very good question, because, we, the app from the, if you just focus on the app, from the previous version to the one we went live, there are only a few, changes. It was more about, did we have enough feedback from enough people on the ground that we thought that the product was stable enough, reliable enough?
Obi: behind the scenes, we've done a lot of internal plus from trusted friends, external security audits of different elements as well. I don't like to publicize it because it's just something we do. We don't think it's something you should promote to saying, Hey, look at what we're doing. We just try to build the best that we can.
Obi: and the really, big thing was to just say, a lot of people ask, is Fedi ready? And we wanted to get to a line where we thought it was good enough. And we got to that line. And then, we also wanted to have enough proof points in, the world. And again, we got to that line. So these things were separate things that were happening.
Obi: And finally, it was very clear to us that we wanted to make the software, Ultimately open source. And that was a big call because, you know, we raised 21 million and, normally you go two routes. You go, you raise a little bit and you stay open source and so on. Or you raise a lot and you stay closed source.
Obi: We believe that, over time, it's going to be considered, over the coming years, it's going to consider that you should always go open source no matter what you're doing, but we're in a transition. Five years ago, raising this much and going open source would be considered crazy, in five years time, raising this much and not being open source would be considered crazy.
Obi: And we wanted to be, afforded in that. So. We actually went source available. It's called a business source license. So it means you go source available and you set a date where you must go open source or earlier. and we set those. So we cannot change it now. We cannot say we're going to actually change our mind.
Obi: Well, the only thing we can say is that we're going to go open source earlier. that's the only thing we could do. Or if we decide to shut down, it's automatically open source as well. That's the sort of dead man's switch as well. Or we decide we're no longer going to develop the software.
Obi: we've added caveats like that, which are not optional, but actually add more restrictions. So no one's going to complain with us going open source earlier. that was agreed and put in place on May the 4th. So May the 4th we review of this year, 2024, just for posterity.
Obi: we, got enough proof points from different markets, that we felt that we're onto something here. Does that mean that we've finished? No, there's a lot of work to do, but enough to say that the idea of taking all of the best of freedom technologies out there. And putting them into one place and one app that's easy to use is something that's compelling to people.
Obi: And also we had enough to see the federation model. of this sort of really simple to use and privacy preserving multi sig is also a powerful model. So the model was proven out. And then finally the software, we got to a point where we thought, it's, of course, we've got years of more development, but it was good enough as well.
Obi: I think that was the final piece. And we thought, okay, we're ready to go. And we then set a date a few weeks after that. But even when we were getting close to it, we started the process of shooting a video because we just wanted to show people are wondering what were we doing for the last nearly two years and we wanted to show that as well.
Luke: what's the synopsis of the last two years? Like the big highlights?
Obi: so, I always say there's three phases in the business. There's initialization, of a startup, initialization, market product fit, in our case, not product market fit, I can go into why. And then, growth. And so, this phase that was, the end was finally, we crossed the line, on August the 6th, 2024, was the initialization phase.
Obi: And so, if you think about the analogy of, like you wanted to have A shop selling designer pet clothing, and you've decided you have this crazy idea and you have to first fund it, find the people to build it, and then find the place, set up the store, make the clothes and, open.
Obi: That's the initialization phase. And then once it's launched, you then. Start figuring out, okay, people come in, there's initial, interest, and then, you have this trickle of people coming in, you have to figure out what do they like, what do they not like, what do I have to adjust until it becomes this sort of regular viable business.
Luke: That's the market product fit phase. And then you start saying, okay, I've got something that's working fully and then I will repeat it, make more and more and more, Widgets?
Obi: Doggy fashion, Excel stores, whatever you want to call it. the last two years was our initialization phase.
Obi: we had this, amazing product with FediMint. we had this initial set of, crazy people with Erik, the inventor of FedEvent, Justin, who's, who was also incredible engineer, who was actually the one who suggested that we make a commercial enterprise. up until that, both myself and Erik just suggested it would be an open source project.
Obi: And then myself as well with my just, you know, only maybe six or seven months before we were finally finished selling. a Bitcoin exchange, the UK's longest running Bitcoin exchange. and so having that experience of building a company that was profitable and understanding what it meant to build something that custodies a large amount of money for people and provides them services is easy to use and all that sort of stuff.
Obi: and everything around that customer service, everything around that. So, we were there, I had a visit to the Oslo Freedom Forum, and that was the catalyst. we did one talk at, Bitcoin Miami, and, Alex Gladstein saw that, he suggested I go to Oslo Freedom Forum. I went, my mind was blown and I also realized whenever you're thinking about a business, you have to always think about chicken and the egg and how do you find your initial market for eventually this product is applicable to everybody everywhere, but who's the first use case that has a demand so high that they're going to willing to go through the really buggy early versions and help you.
Obi: Stabilize it to the point where it's something that people can click a button and it works everywhere. I realized that the community of human rights defenders and later on also humanitarian organizations fit that, need. We really cared about that need and we were concerned, we wanted to help, but we realized that this product could help in combination with the rest of the Bitcoin ecosystem.
Obi: That's what's quite cool. FediMint is the thing that handles the custody, but you still need to buy things, sell things, find things, and so on, and that's where the Fedi app also comes into play, but without FediMint as the core to handle the custody, the rest didn't make sense.
Obi: Then we started, it was, then you had this sort of scene from like the Magnificent Seven or so on where you're, you're finding your initial team members. So we found Renato Rodriguez, I chased her for like six months ago. She should have, you know, got a restraining order for six months trying to get her to join.
Obi: just if you look at the initial team, it was just everybody, the whole team is amazing. But it was just trying to find these incredible people. they tended to just immediately understand the value proposition and the market we were trying to help and were already doing incredibly well in their own careers, but there was something missing for them.
Obi: And when they saw this, it was like this fulfilled There's some other need that they had beyond the monetary need. The potential was amazing, but the mission side of it was what helped us bring on this incredible team. So I believe in philosophy, people, process, product. The philosophy was amazing, who we're helping, the potential, it's helping people and in so doing we're helping Bitcoin, in so doing we're helping the world.
Obi: And that's a powerful philosophy and mission and that attracted this incredible group of people. And if you've got the philosophy and you've got an incredible group of people, they will put in the processes that will lead to the right product.
Obi: It's like, let's say the video, for example. I said to Renata, I want a really powerful launch video and it should be like the best Apple keynote speech combined with a UNICEF or Save the Children commercial. That's it. That's the whole brief and that whole video. And somebody says, you need to go to Madeira.
Obi: You need to say this. And I just woke up and I say what she says. But the whole elements of it, all of it was her and her team, Mary and marketing and everybody building that over the following X months. and I didn't actually see the video myself. Until less than a month before we launched it for the first time as a rough draft.
Obi: And it was just basically perfect. My comments were like, I actually didn't have any significant comments, but that was the same for most of the team and the design of the product. We had this incredible designer, Skylar. I would give a brief and so as, Erik's brief was, I just want to be proud of something that I should be proud of, and that was it, you know?
Obi: And I was like, it just needs to be really simple. And that's the high level. And I might give comments on a little bit here or there, but in general, whenever he gave me it, I would say, well, he Skylarized it, like just Skylarize it. And he would just come up with something that was great. and I think that was the last two years.
Obi: We had the team we raised. again, the choice of investors was really, really key. I was very, very sure, especially from my previous experiences, that I only wanted Bitcoin on the investors, especially for the first couple of rounds. And when I've sometimes do talks on how to set up a Bitcoin company, my first slide says don't do it, but instead sort of a Bitcoin business, not a Bitcoin startup.
Obi: And I explain the difference between the two. but one part is, if you do want to raise capital, be really careful about your choice of investors. The wrong investors will, well, and they don't mean to, but they will kill your business without meaning to, but the right investors will. So, we were really, really careful about our choice of investors and the initial team and then the initial team brought on the rest of the team after that.
Obi: And that was the last, that's the last two years we've set ourself up very well. I did, being a classic entrepreneur, think it'll take six months, took two years. So I, so my estimation on that was a little bit off, but the end result, I'm really excited about. And now, now we're, now we're off to the races.
Great news, everyone! Bitcoin, the inverse of clown world is out now. It's the successor to everything divided by 21 million. And it's based on the last two years of podcasts that we've done together. So if you like the show, you're going to love the book. Find the book on bitcoininfinitystore. com or on Amazon.
That's right. We have our own store now. BitcoinInfinityStore. com. You can find not just books, but merchandise based on everything divided by 21 million, check out Bitcoin, the inverse of Clown World today and buy some other stuff while you're there too.
This show is brought to you by Bit Box, our favorite hardware wallet. It's Swiss engineered and has all the most important security features to keep your Bitcoin safe while keeping a user experience that even your grandma can use. So visit Bit Box. Do Swiss slash Freedom to learn more, or use Code Freedom at checkout for 5% off.
And remember, it's the Bit Box zero two Bitcoin only edition. Make sure to get that Bitcoin only firmware.
How does Fedi Make Money?
Knut: How does the app make money?
Obi: Yeah.
Knut: For the company?
Obi: if you use the app, whenever you use the Freddie app. whenever a transaction happens, which would have occurred a fee. So it's a Bitcoin transaction, e cash or a lightning transaction. We add on an additional fee, 21, 21 basis points. So 0.
Knut: Oh, yeah,
Obi: And so, and the good thing is because we can charge in sats and I believe actually even fractions of a sat, it's a progressive tax, which a fee.
Obi: So what I mean by that is. If you're sending, let's say 100 through, then you would be charged on 100. 21, but if you're, worth of value, but if you're sending through 1, then you'll be charged 0. 21 cents. And if you're sending through 0. 10, you'll be charged 0. 20. 0 to 1 cents. So it'll always be a very small percentage of what you're sending.
Obi: Now, people might say in certain countries, don't they have mobile money and so on. But the problem is those mobile money systems have minimum fees. And it might be, 1%, which is not that bad, say. And it might be, even in some terms of scale, it could be half a percent, but with a minimum fee of 20 cents.
Obi: So if you're sending a hundred dollars, that's okay. But if you're sending, 1, that's 20%. And so if you have someone who has a monthly salary of. 10 in some of these markets, that 0. 20 fee starts becoming quite a significant per transaction hit. So therefore it becomes unaffordable for you to use mobile money.
Obi: So even though it's prolific above a certain wealth level, and so that leaves many people out, in the rain. But because this is progressive, if you're selling 10 cents, the, fee will actually round to zero. I mean it will be a fee, but you'll see it in sats, but if you were showing, trying to show it in local currency, it would basically be, it'll say about zero and then you click and you realize it's this small amount of sats.
Knut: so, yeah. the big thing that I'm thinking of if I'm like. Playing this out in my head with where this could be in 10 years, like you could run entire virtual nations on a federation, right? If you have the money and the communication and whatever other useful apps,
Obi: I think the big thing I think is, if you look at the internet, there are large organizations where, people use and they're highly centralized. You have a few people who may be wealthy enough to have their own direct connection to the internet, but the majority of people are connected on the internet.
Obi: I don't know at this stage, millions of intranets, like household intranets effectively, company intranets and school intranets and so on, where it's one connection to the internet shared by multiple people. That's actually the majority of people. And it's that middle ground between these huge mega organizations that people are connected to one mainframe.
Obi: With millions of users, I think there are very few of them now, but that was the denominant way at the beginning. It was these huge, centralized ways of connecting AOL, CompuServe, and so on. Now, they're actually relatively rare, but that was at the beginning. All of the internet was that. A few centralized parties, and I would liken them, conceptually in value terms, in value custody terms versus information custody terms, to, a coin basis.
Obi: And also there were a lot of hobbyists who had their own direct ISDN connection to the internet. but now most people connect through these intranets where they get one router, one connection, and they share with everybody in their household. That would be a criminal of the Uncle Jim federations or in their school or in their football club or in their office.
Obi: That's probably 95 percent of people and I think that this approach of federated model from the size from. Five or six people up to five or six hundred thousand, that range can cover 80, 90 percent of usage.
How to Use Fedi(Mint)
Luke: Can we go back to the basics of how feint works in the perspective of someone actually using this thing? So, you explained to us last time how it works, but just for my own sanity, check that I got it. if you are sending e cash within the federation, that is just.
Luke: Direct between two users. There's not even a record outside of that. No one knows those transactions are even happening. Is that essentially correct?
Obi: Yeah. So the federation helps you mint technically, because actually the user creates their own e cash, they create their own e cash, but it's unstamped and then they give it to the federation and they stick in an envelope. And they give it to the federation with some carbon copy paper on the inside the envelope as well.
Obi: the federation collectively signs. So let's say all four people go stamp, stamp, stamp. And that makes it valid. then they give back the envelope to the user. The user then opens the envelope with the cache that they created, just some random piece of data.
Obi: And they now have this Ucash, but the Ucash they've created now has got the four stamps on it, say, for the four of us. And so anyone else in that federation, any other, person who's also connected to the federation. They can just literally, directly give them this, random set of data.
Obi: Let's say it's a picture of a fashionable dog and they can just give it to someone else. and the person will receive it and they don't really care what the data says. They just look, are the four stamps on it? Yes. Then it means it was stamped by the Federation, which means it's backed by a certain amount of information.
Obi: Actual Bitcoin. Yeah. So take the whole, the full path. Someone deposits some Bitcoin in return. They also, along with the Bitcoin, send them an envelope, give them an envelope with this random piece of data in it to the Federation and the Federation receives the Bitcoin. Okay. I've received the Bitcoin envelope.
Obi: Okay. I've received the Bitcoin. I will stamp. I received one, let's say. 10, 000 Satoshis. So I'm going to take my 10, 000 Satoshi stamp and stamp this envelope with 10, 000 Satoshis, pass it around to the other four, they all stamp the 10, 000 Satoshi stamp. And then give that back to the user.
Obi: User opens the envelope and says, I've got, okay, I've got an e cash note with, with, that's been proven that the, that it's been validated by the guardians. So as long as we all trust the guardians are holding that and that they will honor this and redeem. That's it. So now I can pass it to anyone in the Federation.
Obi: They receive it. They look at this picture of the cute dog, but what they're really looking at is, is it got the four stamps on it and it's 10, 000. So that means I've now received 10, 000 token. They can now at some point in the future, Often they do it immediately if they've gone into connection, but they don't have to.
Obi: They can give it back to the Federation. Federation will receive it and each one will check their own signature of the guardians. Okay, it's properly signed. Therefore, I'm willing to, and they might give them a Bitcoin address to send the money on chain to.
Obi: So they will receive it, it looks good, they will then, record that this, e cash note has been spent. But they don't know, of all the e cash they received, which one it was, because each one they received in the first place was in an envelope. So was it the first one they received, or the middle one they received?
Obi: They have no idea. It could have been received yesterday or a month ago. No way. All they know is, I must have stamped it, so it was one of the ones I stamped. And then they will look at the address the person's asking to send the Bitcoin to, and they will take some of the Bitcoin that they're holding in the multi sig that we're holding between the four of us and send it to that address.
Obi: So that's called Redeem versus Mint. Now, the user experience from a user, we can get onto Lightning, that's another level of complexity, but it's simple just for Bitcoin and eCash for now.
Obi: Someone sends me Bitcoin or I send it to myself from an outside wallet and I receive e cash. And then someone else in the, in the federation wants to, once I want to pay them some e cash, they will give me, they will give me a QR code to, to scan to pay and I will scan. And literally the e cash that's on my phone gets sent to them directly.
Obi: From me to them, one to one, that person when they receive it could keep it on their phone or they could say, you know what, I want to send that back to the federation and they can send it back to the federation and then the federation can destroy that, issue them new, fresh e cash in different denominations, maybe not 10, 000, but 10, 1, 000, you know, just like with notes, you could go and get change.
Obi: Yeah, because if someone transacts, if you're saying it gets sent from one computer, phone being a computer, whatever, one device to another, well, that original device would still
Obi: Yes,
Luke: copy of the thing on, right.
Obi: So they will still have a copy. Now you are in the same, this is where the community aspect works, you are in the same community, If you're in the same community, and the person, it's a merchant and you receive, and your phone will remember when you received what e cash, yeah?
Obi: Even though it's private, you do know this e cash was received at this time and this time for, and so, especially when you integrate with points of sale, it will say, well, you received this e cash for this purchase. You'll know that. so then if you go to redeem it, at the end of the day, and some of it doesn't match, you will know as the merchant, which e cash was involved in that.
Obi: You'll say, well, the e cash involved in this transaction. And that transaction was with John. So you've got proof of work. it's the same as if you have a merchant and you receive cash and then you finally got the end of the day to a bank.
Obi: And some of the notes are counterfeit. Now, you don't find high levels of counterfeit notes in a community where people know each other. It's normally in these widespread communities. But in those scenarios, what most people will do and how the default way the app works is the moment you receive it, it immediately goes off and redeems it and then issues itself back new, new change.
Obi: Yeah, that seems like a good default implementation. but if you have no internet connectivity, you can still use it and still receive. even if you can't send over the internet, you can create a QR code, which contains the e cash in the QR code, and the person can literally scan it and receive through the screen.
Obi: Because as long as it's the QR code, the e cash note is just some text. So a QR code can represent that text and you can scan it, even if you have no data. So for example, it could be you're in an area where you have no data, rural, Latin America or so on. But it could also be something more innocuous.
Obi: You could just be in a big sort of, But the thing is is that you might be at a Glastonbury like concert and there are a thousand phones and there's no data. Or you're in an indoor conference place underground and there's no data. But you can still take payments or the merchant has internet because they're the ones who really need it.
Obi: But the buyer doesn't and so in which case the merchant has internet because they're connected wired in because they're fixed, but the buyer doesn't need to have internet to pay and the merchant will just take a risk just like in most merchants in high streets they accept a certain amount of breakage and a certain amount of transactions are gonna be charged back by, credit card companies and so on.
Obi: I used to be a CTO for a major pan-European, online auction company. At the time I was competing with, eBay and so on. we were in a headliner, 300 hundred people working for me in technology. It was a very big technology offering. And we were doing millions of transactions a week.
Obi: It was very high volume. And in those e commerce sites, you just accept a certain amount of breakage, a certain amount of returns, and a certain amount of chargebacks, even if you do nothing wrong and you just factor it into your costs. For the benefit of the simplicity of the experience.
Fedi and Nostr
Knut: you mentioned Nostr before, like, what's the marriage between Fedi and Nostr? Well, I would say right now, we are, because I think.
Knut: we're beyond dating. We're engaged. But we want to really take the two footed tackle of no return, to use a football euphemism. a web of trust thing, right?
Obi: Yeah, I think, whenever, from the first point I saw Nostr, a lot of people thought it was just social media and so on.
Obi: I think social media is Trojan horse is the wrong word, but it's the, initial vector by which it infiltrates communities. But what you're actually doing is building a simple, trust system and a simple discovery system. It's a form of decentralized search and it's a form decentralized identity.
Obi: Cause you, to search, you have to identify things to be able to search. So they're sort of two sides of the same coin. now the first thing you're using it for is identifying people who want to speak publicly and share their thoughts and so on and so forth and follow them and give feedback and like.
Obi: But it always seemed to me to, way more powerful than that. And I think now people, generally understand it that way. And so, What we've already done, in Fedi, and a lot of developers really like the way it works, if you sign up to Fedi, or if you download the Fedi app and start using it, you, first of all, you don't need to give your email, you don't need to give your phone number because it's not required, but, we do ask you to come up with some sort of Username for yourself.
Obi: That doesn't even have to be unique, by the way. We will add a unique element at the end, from it. But what we do is, whenever you create that label, which you can change the name, but we create, an NSEC, which is a Nostr, identity effectively. A unique identity and we automatically create that for you.
Obi: So again, for our users, we don't want to start educating them on the history of Austrian economics and Bitcoin and inflation at the beginning or a Nostr, et cetera, and how it works and relays. And we just want them to start using it. then subtly over time we expose certain features of it. So people become curious and then eventually.
Obi: You want to learn how this thing that's delivering value works, but we've put proof of work first, proof of talk second. So we educate through letting people see the benefits. And then there might be some people might say, well, how does this car thing work? Or how does this fridge thing work? But I don't need to know how refrigerant works to be able to use a fridge or how microwaves work to use a microwave.
Obi: When they want to know how all this stuff works, but we benefit first. So, and so and that's how it works with Nostr We immediately give you an NSEC.
Obi: And so because we've got that if you go and use unleash. chat, for example within the app It will go and you click login and there's one option login by Nostr You click that and it'll just within the app pop up something saying Nostr Do you want to log in with Nostr? And you click yes, and you're logged in and it just works and then you, and then also now you're logged in and then you can, and then you click, deposit money and instead of having to go to a different app, copy and paste the QR codes, it just, it pops up and says, do you, this, this, what the app's asking you to deposit this amount of money?
Obi: Do you want to go ahead? Yes. And then it's e cash. Is, is converted into lightning and then that you pay by lightning. But from your point of view, there's a circling key for three or four seconds. You have now credited your account. Do you want to withdraw the money back account? You click withdraw the amount.
Obi: Three or four seconds, it's been withdrawn to your account and, and it's all within the same app. so, but that only works because now if you, close the app or delete the mods, because you can delete these mods or these additional pieces of functionality, they're basically webpages, but the icon for them, and they have an app like experience, but they're actually just webpages.
Obi: and then you go away and then you delete the app from your service. Like six months later, you come back, you, you, you enter your 12 words, you're, you're re log on. And then if you scan to join a federation again, it will recognize that you were a member of the federation before, and it will reconstitute and recreate all your e cash and put it back on your phone.
Obi: And then if you click on, Unleash your chat or Stacker News or anyone that supports logging by Nostr. Your login with the same details and so on. So you basically, and we want to make that even more seamless. So from 12 words, your entire life can you think about moving from one mobile phone to another, where you have to move all your apps, your banking apps, your chat apps.
Obi: And now you could do that with just go and also try moving from an iPhone to an Android phone, Android to an iPhone. It's a nightmare. Here you could just download the Fedi app on your iPhone. this is some far point in the future. You don't have just chat, but you also have voice. You have video, all of that running from encrypted chat.
12 Magic Words
Obi: you have access to money from, custody and payments. You have access to all these apps and then you back up 12 words. And there's something we call social backup, which is mind blowing, but, that's in beta. But let's just say backup 12 words, and then you delete that app, go to a different phone, could be an Android or an iPhone, and you just enter 12 words, and your entire thing comes back.
Obi: Not partially back, but it all will come back. based on just those 12 words and that's only made possible because of Nostr and we want it over time.
Knut: mean, when you think about it, it's insane. It's already insane with bitcoins, with the 12 magic words, because like every time I pass a security check at an airport, I think that go ahead, have my 200 milliliters of toothpaste. I'll, I have my 12 magic words, like it's the ultimate fuck you to, to anyone trying to meddle with your business, right?
Knut: that's the dream. I mean, we're not fully there, but it's, I would say it's like, we're like 90 percent there, but to extend beyond just your Bitcoin, Nostr is the protocol that allows us to do that because it's notes and other stuff and the other stuff can be, an encrypted version of the settings and so on that you have that we can store and be willing to pay for.
Obi: And then when you recover, you have your bitcoin, but then you can go off and send a request to say here, I'm willing to recover this file. Here's some zaps for the file and you get the file back and that additional file then contains the information. Okay, these are the federations you are a member of, you rejoin them.
Obi: These are the mods that you had, they're reset up. These are the settings you had, they're reset up. And then you log on them automatically using Nostr as well, the NSEC and Nostr login. from your point of view as the user, 12 words, it's back. I mean, you might have to drink a cup of coffee while it's happening, but 5, 10, 20 minutes later, it's back.
Knut: it's amazing, and it's an inheritance plan. Like, you can live forever by just letting your descendants, giving them the 12 words when you're on your deathbed.
Obi: backup also becomes really powerful, because social backup means that, cause the 12 words is still another thing to secure. And it's sort of one of these turtles all the way down type scenarios. Okay. We've got all this incredible security Fort Knox like, but behind them, but I walk around the back of the Fort Knox is these 12 words that's stored.
Obi: you also give one to your cousin and you say, look after this as a backup. And your cousin stores it on a fridge magnet. You know, you don't know, or you don't know your, your, your security is the lowest common denominator.
Obi: For your 12 words. And
Knut: is never stronger than the weakest
Obi: then the weakest link. And so with social backup, which is definitely an early beta. what we can do is use the power of the federation where we can take your 12 words, encrypt them and then split it up between the four guardians in this case, or seven guardians or 40 guardians or whatever.
Obi: For larger federations, and they all hold a piece of your encrypted piece of your, of
Knut: is important here.
Obi: Yeah.
Knut, what are you doing over there? I'm stamping my seed. Everyone tells me I should, that it's good for bitcoin security and whatnot, and that I should go balls deep into bitcoin security, so I'm stamping. You don't do it like that, Knut. You don't stamp that seed. You stamp your seed phrase. What? Your seed phrase.
Oh, so that's what these things are for. oh, I get it now. That's exactly right, Knut. And you can get everything you need to stamp your seed phrase at stampseed. com. And be sure to check out our limited edition Everything Divided by 21 Million Titanium Seed Plate.
And use code INFINITY at checkout for 15 percent off. That's fantastic! And it hurts way less!
Redundancy in Fedi
Luke: So this gets me back to what happens when one of the guardians drops off, and if it's like in a permanent way, if that one guardian is holding a piece of everyone else's 12 words, does everyone
Obi: Yeah. But it uses a prot, this is crypto, where cryptography comes in. So it's not like. We've taken your 12 words and split it up free between four guardians. Instead, you encrypt it using a scheme that allows each one of the four of us to have a cryptographic piece.
Obi: But as long as any three of us combine our piece together, we can recombine. It is, it's called, SHAIR Secret Sharing Scheme, but it's a way of cryptographically achieving that.
Luke: Excellent, I think you mentioned last time as well that if a guardian does go down, essentially you can replace that guardian, can you take us through that, adding or replacing a guardian if that ever were to need to happen?
Obi: replacing a garden is, probably one of the most complex things. And so you wouldn't necessarily replace a guardian, but what you would do is, some, if someone were to go down, there's two different things. The machine. Or the guardian, the actual person. So if the machine goes down, you can set up a new machine and you can recover the status of that.
Obi: You can, you can download the 30 minute software on that new machine. So that's the actual server that's running. And that will then connect to the rest of the federation and, and carry on. So as long as the guardian has a backup of their keys, they can recover that one machine and, and catch up and it'll automatically catch up.
Obi: Just like if you turn off a Bitcoin node and turn it on, it will reconnect to the Bitcoin network and catch up. It's a similar concept. so that's if a machine went down, if a machine was temporarily disconnected from the internet or, lost power, it would just restart and reconnect and you will have zero downtime as a user, as long as it's still running and active.
Obi: And this will all be, you'll notice that the performance will still be the same, but if you went into settings for that federation, you'll see that three of the four are running, so one is not running, but that won't affect your usage.
Obi: Is the N of M like a ratio, or is it always N 1, for example? It's a ratio. the number of guardians that, you need to have is dependent on how much redundancy. So if you want to be able to handle one guardian going down, then you'll need to have, one times by three plus one. So that's four. So that's why you need three or four.
Obi: if you want to handle two going down, then you need two times by three plus one, which is seven. So it's five of seven. 7 of 10, 9 of 13, and so on and so forth. You can have more than that, but the time that you get additional redundancy is every 3, but you can have, for example, 4 of 5, if you wanted to.
Obi: Anyway, so, yeah, in the event that someone goes down, that the machine goes down, you can recover. recently there was an issue where one machine, where two federations, had an issue with the domain name for one of those servers. And so if the domain name for someone is no longer available, you can now, with the update that came out a couple of weeks after that, you can modify, the domain name
Obi: for a Guardian 30 minute server, and it would communicate that securely with the other, Federation servers and then reconnect and, continue to operate. But it's important to, even in that scenario where the Federa Guardian, the domain name server went down, the Federation itself, Continue to operate because there was still at least free running.
Obi: So there was no downtime for the user. Whereas if, if we hadn't been federated, then for the one week or so where that was down, the users would have had no access at all, which would be the case where you're connecting to a centralized or a single server, offering. now, if one of the guardians, for some reason, the actual people who are running the Fedemyst server, for some reason, you no longer trusted them, they'd been helpful all their life and all of a sudden they decided, or they've been turned by some, malevolent nefarious actor.
Obi: Then you, if you could in theory pass to someone else, but in practice, you know, how do I know that the other person isn't still going to continue to operate it and so on and so forth. So what you actually want to do is set up a different federation and transfer people, the other three guardians and inform people with a different set of four people.
Obi: So those three, plus someone else. And just tell people to transfer their balances across. But transferring balances across is as easy as doing a lightning transaction from one server to another. You can, you know, within the FEDI app, be a member of multiple federations at the same time. I mean, right now, I mean, I'm a bit of a power user, but I'm a member of, over a dozen different federations from around the world.
Obi: I mean, well over a dozen, I think, yeah. and as we've, I'm sure there's people in the team with way more than that. but obviously I can't advertise the names because many of them are private federations. So, but there's a few public ones, but there's way more private ones.
Interoperability
Luke: So is the e cash, if you're in multiple federations, is it interoperable there, or it's like a more like a, it's a lightning transaction between those two federations, but it's e cash that lives
Obi: You got it. It's, E cash lives within its federation, but the interoperability layer for most people is not on chain. It's for the vast majority of people, it's Lightning, so, but the user experience of sending e cash from one person to another in the same federation, sending e cash from one person to someone else receiving Lightning.
Obi: on a different wallet that's got nothing to do with Ferdie Mint. And finally sending e cash from one person in one federation. To someone else in another federation over the Lightning Network in between is exactly the same. From your point of view, QR code scan and the system will combination of the Fedi app and or whatever Fedi Mint compatible app you're using and Fedi Mint servers will make the experience
Obi: I just need to send the person the cash. In this case I can send e cash out over Lightning and that's my job is done. And then the other side would be a Lightning wallet and it will receive. And in this case, I will send e cash over Lightning to another federation, but I don't even know if it's another federation, it's just a Lightning address.
Obi: And then the other federation, receives the transaction and the other 30 minute server receives e cash on the other side. But from a user's point of view, this is the thing that also took the two years to make the experience the same. You just don't have to worry about which one is doing.
Obi: The fees will be slightly different. One won't have a Lightning component to the fee, e cash to e cash, but, the other two will because it will be like, in both cases, it will be e cash to Lightning, from your point of view.
Luke: So is there a fee to send e cash to someone else in the same federation? No, I guess. Right.
Obi: It depends on the federation. the federation, could choose not to charge a fee and many in these times choose not to because they're doing it for friends and family and so on and the fees are minimal. the Ferryman protocol does support, what we call a DDoS fee. So basically you're spending effort time
Obi: to sign these notes, the issuing is done by the user, but the stamping takes time. you're signing something cryptographically, that's effort. and you're also doing it in a federated manner, so you're coordinating and then you're all collectively signing.
Obi: So, to avoid DDoS, you can turn on a fee and, by our calculations, it doesn't need to be very large, one sat per note that issued is enough to prevent, because if someone really tried to DDoS you at scale, they could, but on normal sort of consumer laptops or hardware, they'll have to spend, hundreds of thousands a month at that sort of, one sat per note, and in which case you'll say, fine, you're giving me hundreds of thousands of dollars worth of Bitcoin to burn my, CPU.
Obi: Well, not to burn it, but just to heat my CPU. so you can charge a fee. And I think some will experiment with charging a DDoS fee, which is similar to Bitcoin. the fees in Bitcoin are a DDoS protection vector. So it's the same concept.
Fedi's Roadmap
Knut: All right. So, what's on the roadmap? What's going on? How does the future look like? What will you be working on the next five years? And where do you see FedeMint going?
Obi: that's actually, the most, fun phase. up until now, we had a hypothesis and we had some early feedback, but a lot of it was based on, A hypothesis and theory as to what we thought people needed and we felt that freedom technology had got to a stage where they were good enough to provide this combined experience.
Obi: And that was a hypothesis. And we think we've got early validation, but we built that. Now it's life. And now it's the fun, but it's also the scary bit because we now actually see people using it and we test all our hypothesis. And this is the point where you have to be very detail oriented, very much listening to the users and listening to what they say
Obi: we cannot ignore if there are. Parts of our hypothesis that are incorrect, we have to adjust to support that. So it's going to be a lot of listening and we've already got hundreds of requests for feedback. and then working to rectify, or deal with the questions or feedback they've given us or the suggestions they've given us.
Obi: and we're going to continue to iterate and then we bring it back out to users and see what they think. And we keep in that loop. This is the market product fit loop until. The product that we produce, fits the requirements of the market. Now, again, I, I'm hoping that takes six months or less, just like I hoped it took six months or less
Obi: for the initialization phase, but it might take less. It might take a bit more, but it's fun. and that's the next phase. After that, we then go into the growth phase. Once we know we've got something that's repeatable, that really. is at the quality level that users need for it to be used a daily part of their life.
Obi: We'll then go into growth phase and that's where we'll really, you know, pull down, put our pedal to the metal and, and just repeat, repeat, repeat until. You know, billions of people are using this around the world, but that, that's phase three. And I'm, I'm very focused on this phase. You don't want to rush into phase three.
Obi: We're not going to rush to grow the numbers, until we are very sure that we've got something that's really slick, really reliable, and where we're meeting a clear demonstrable demand consistently. And that process is called human centered design. So it's not focused on this is my app, this is what I want, and I'm going to keep trying to make you agree with what I want.
Obi: this is what we've built. This is our first stab at it, but we're going to keep iterating until it serves your need properly. And that might require some, this is what makes this one very hard because it requires a very different mindset to the phase one. Phase one is like We can do everything and the impossible is possible phase two is really being pragmatic.
Obi: Or very self critical and being very open to killing your darlings, as the saying goes, you know, and saying this is not working or, or there's some fundamental issue. I mean, I don't think this will be the case at this stage, but if the feedback was from our market that we need to make some fundamental changes that would mean that 80 percent of the code we built has to be thrown away and have to start again.
Obi: Well, that's what we're being told. we've got far enough to think that's highly unlikely. cause most of the feedback, like some of the big pieces of feedback cause how can we make it easier to set up federations? So that's a really good sign because lots of people said there's only going to be a demand for like free federations and it's going to be very centralized.
Obi: Well, a very large percentage. I don't want to give it. These are the very large percentage of all our queries so far have been, how can I set my own federation up? So even based on those queries, there's not going to be free. You know, I can put it that way.
Luke: Super quick question on that, I guess, is it the Fetiman software? Is it on, for example, the note in a box, solutions, the umbrellas, start nines, et
Obi: Well, that's part of the feedback that we're getting. For example, can we set it up? Can you integrate with Umbro? Can you integrate with Start9? Can you integrate with RastyBlitz? can you make it simpler to set up? So, I think, a lot of that's done by the FediMint team.
Obi: Because remember, FediMint is an OpusSource project versus a different OpusSource project. At some point in the future, it will be two different open source projects. However, we are using them as the bedrock, because if you want to custody significant amounts of value We know that you want to go multisig.
Obi: Multisig for significant amounts of value is the best standard, and also you want privacy, so then privacy and multisig, that's FedEvent, basically. but, on the FedE side, we can do a lot as well. So we can provide, even though it's open source software, we can take it and provide it.
Obi: again, it will be open source, but tools to help you build it really easily or put efforts to integrate with people like Umbrell and Start9. we've already had an integration with an organization called Clover, which we've been working on, and you're going to see more on that. But from our point of view, that's a lot of where the work is.
Obi: Also you want to connect this to the Lightning Network. And connected to the Lightning Network and maintaining a reliable connection is not easy. it can be complicated for people, especially managing liquidity. And now again, over time, I could get easier, but right now it's not easy.
Obi: There are organizations like, Breeze and others who make that easy. and you just saw an announcement from Erik, where they've already started, showing connectivity and support for LDK, which is this cross, LSP standard. So, again, we at Fedi can provide tools for FediMint, or people who are using FediMint, whether it's with Fedi or someone else, that make it really easy.
Obi: And again, our aim is one click, and you have a connection. You can set up your own lightning node that's set up in a relatively good way, so it'd be relatively reliable, but you don't have to manage it yourself. Or, you can connect to one of these LSP's and for a fee, they'll just handle all the light and management, but you're still in a trust minimized way.
Obi: So there's, but given all the feedback we're getting, it's not, this is completely wrong. You need to go back to the drawing board, it's all, okay, I get it, but you need to go further. You need to integrate with more. You need to make it easier. so that's a good sign that we're on the right track.
Knut: Yeah. So, what about this date when you go open source? is that public or, when you have to go open source, it might be then or
Obi: in the, it's, it's, it's memorializing the business source license. In fact, we memorialized it. We actually have this memo memorializing when it happened. when we launched Freddy, we, we did this thing on the Bitcoin block. You can see it. We were established on a certain block.
Obi: And we said Fedi is here. When we, quietly on May the 4th, we also put something that said Fedi colon and it was a hash. That hash is a hash of a memo. And the memo, which is on our, Fedi's got an open source, you can see the link and you can verify it. Showed that on May the 4th, the code became business source license.
Obi: And by January the 3rd, 2026 or earlier, we must go, open source. And if we were to shut down or to stop development, we will instantly go open source. and so, so that, and we put it in block. I tried to find a core block. So it was block 8, 42069. It was actually was the block that was the core block as well.
Obi: so yeah, it's, it's there. And, that's the date. We, we cannot go open source later than that. And we may very well go open source a lot earlier than that.
Wrapping Up
Luke: Hey Obi, I think we could keep on grilling you on this and that little detail, but this has been really enlightening, fantastic to see how far this has come, even since our last conversation back in October, and yeah, just looking forward to everything you guys are doing, and I guess just as a last thing, people can now grab the Fedi app and Public federations are available to start to try
Obi: federations and there are, and you can set up your own federation There's a lot, I don't like to talk too much about what's coming in future because we just work on everything in order of customer demands. So if customer demand comes in, that changes the order, but we're working really hard to make it, It's already easy for if you're quite technical, but we're going to make it easier and easier to set up a federation, so keep looking out because that's a very common request to set up a federation yourself, and we want to see what people do with it, create Fedi mods, create federations, use it, give us feedback, and we will continue to work on making an incredible, Open source interface portal to this freedom technology world.
Luke: Absolutely fantastic. We'll need to keep on having these conversations regularly, get updates because always fantastic to hear about this and good luck moving forward and I think we'll be trying some FETI stuff in our futures here. Lots of cool things have come out of Nostriga and Baltic. Honey Badger by
Luke: I'm exciting to see that. And anywhere else you want to direct our listeners and viewers.
Obi: So for Fedi, that's probably the best place because everything, that's a jumping off ground for everything else. And that's Fedi, F E D I dot X, Y, Z.
Luke: Fantastic.
Obi: One of the cooler things that came out in Nostriga and Honeybadger was of course, yes, the inverse of clown world, our new book, and we want to give you one. if you're not given one during this weekend, you'll find it on bitcoininfinitystore. com. Thank you very much.
Luke: and we need to sign it for you. Yeah, we'll do that offline. But Obi, thank you again. And this has been the Bitcoin Infinity Show. Thank you for listening.
Obi: Thanks.{\rtf1\adeflang1025\ansi\ansicpg1252\uc1\adeff0\deff0\stshfdbch0\stshfloch0\stshfhich0\stshfbi0\deflang1033\deflangfe1033\themelang1033\themelangfe0\themelangcs0{\fonttbl{\f0\fbidi \froman\fcharset0\fprq2{*\panose 02020603050405020304}Times New Roman;}{\f34\fbidi \froman\fcharset0\fprq2{*\panose 02040503050406030204}Cambria Math;} {\flomajor\f31500\fbidi \froman\fcharset0\fprq2{*\panose 02020603050405020304}Times New Roman;}{\fdbmajor\f31501\fbidi \froman\fcharset0\fprq2{*\panose 02020603050405020304}Times New Roman;}{\fhimajor\f31502\fbidi \fswiss\fcharset0\fprq2 Aptos Display;} {\fbimajor\f31503\fbidi \froman\fcharset0\fprq2{*\panose 02020603050405020304}Times New Roman;}{\flominor\f31504\fbidi \froman\fcharset0\fprq2{*\panose 02020603050405020304}Times New Roman;} {\fdbminor\f31505\fbidi \froman\fcharset0\fprq2{*\panose 02020603050405020304}Times New Roman;}{\fhiminor\f31506\fbidi \fswiss\fcharset0\fprq2 Aptos;}{\fbiminor\f31507\fbidi \froman\fcharset0\fprq2{*\panose 02020603050405020304}Times New Roman;} {\f1311\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\f1312\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\f1314\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\f1315\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;} {\f1316\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\f1317\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\f1318\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;} {\f1319\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\f1651\fbidi \froman\fcharset238\fprq2 Cambria Math CE;}{\f1652\fbidi \froman\fcharset204\fprq2 Cambria Math Cyr;}{\f1654\fbidi \froman\fcharset161\fprq2 Cambria Math Greek;} {\f1655\fbidi \froman\fcharset162\fprq2 Cambria Math Tur;}{\f1658\fbidi \froman\fcharset186\fprq2 Cambria Math Baltic;}{\f1659\fbidi \froman\fcharset163\fprq2 Cambria Math (Vietnamese);} {\flomajor\f31508\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\flomajor\f31509\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\flomajor\f31511\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;} {\flomajor\f31512\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\flomajor\f31513\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\flomajor\f31514\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);} {\flomajor\f31515\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\flomajor\f31516\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fdbmajor\f31518\fbidi \froman\fcharset238\fprq2 Times New Roman CE;} {\fdbmajor\f31519\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\fdbmajor\f31521\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\fdbmajor\f31522\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;} {\fdbmajor\f31523\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\fdbmajor\f31524\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\fdbmajor\f31525\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;} {\fdbmajor\f31526\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fhimajor\f31528\fbidi \fswiss\fcharset238\fprq2 Aptos Display CE;}{\fhimajor\f31529\fbidi \fswiss\fcharset204\fprq2 Aptos Display Cyr;} {\fhimajor\f31531\fbidi \fswiss\fcharset161\fprq2 Aptos Display Greek;}{\fhimajor\f31532\fbidi \fswiss\fcharset162\fprq2 Aptos Display Tur;}{\fhimajor\f31535\fbidi \fswiss\fcharset186\fprq2 Aptos Display Baltic;} {\fhimajor\f31536\fbidi \fswiss\fcharset163\fprq2 Aptos Display (Vietnamese);}{\fbimajor\f31538\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\fbimajor\f31539\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;} {\fbimajor\f31541\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\fbimajor\f31542\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\fbimajor\f31543\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);} {\fbimajor\f31544\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\fbimajor\f31545\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\fbimajor\f31546\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);} {\flominor\f31548\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\flominor\f31549\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\flominor\f31551\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;} {\flominor\f31552\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\flominor\f31553\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\flominor\f31554\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);} {\flominor\f31555\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\flominor\f31556\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fdbminor\f31558\fbidi \froman\fcharset238\fprq2 Times New Roman CE;} {\fdbminor\f31559\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;}{\fdbminor\f31561\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\fdbminor\f31562\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;} {\fdbminor\f31563\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);}{\fdbminor\f31564\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\fdbminor\f31565\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;} {\fdbminor\f31566\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}{\fhiminor\f31568\fbidi \fswiss\fcharset238\fprq2 Aptos CE;}{\fhiminor\f31569\fbidi \fswiss\fcharset204\fprq2 Aptos Cyr;} {\fhiminor\f31571\fbidi \fswiss\fcharset161\fprq2 Aptos Greek;}{\fhiminor\f31572\fbidi \fswiss\fcharset162\fprq2 Aptos Tur;}{\fhiminor\f31575\fbidi \fswiss\fcharset186\fprq2 Aptos Baltic;} {\fhiminor\f31576\fbidi \fswiss\fcharset163\fprq2 Aptos (Vietnamese);}{\fbiminor\f31578\fbidi \froman\fcharset238\fprq2 Times New Roman CE;}{\fbiminor\f31579\fbidi \froman\fcharset204\fprq2 Times New Roman Cyr;} {\fbiminor\f31581\fbidi \froman\fcharset161\fprq2 Times New Roman Greek;}{\fbiminor\f31582\fbidi \froman\fcharset162\fprq2 Times New Roman Tur;}{\fbiminor\f31583\fbidi \froman\fcharset177\fprq2 Times New Roman (Hebrew);} {\fbiminor\f31584\fbidi \froman\fcharset178\fprq2 Times New Roman (Arabic);}{\fbiminor\f31585\fbidi \froman\fcharset186\fprq2 Times New Roman Baltic;}{\fbiminor\f31586\fbidi \froman\fcharset163\fprq2 Times New Roman (Vietnamese);}} {\colortbl;\red0\green0\blue0;\red0\green0\blue255;\red0\green255\blue255;\red0\green255\blue0;\red255\green0\blue255;\red255\green0\blue0;\red255\green255\blue0;\red255\green255\blue255;\red0\green0\blue128;\red0\green128\blue128;\red0\green128\blue0; \red128\green0\blue128;\red128\green0\blue0;\red128\green128\blue0;\red128\green128\blue128;\red192\green192\blue192;\red0\green0\blue0;\red0\green0\blue0;\red102\green0\blue204;\red114\green179\blue114;\red222\green74\blue29;}{*\defchp }{*\defpap \ql \li0\ri0\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 }\noqfpromote {\stylesheet{\ql \li0\ri0\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs20\alang1025 \ltrch\fcs0 \fs20\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 \snext0 \sqformat \spriority0 \styrsid13517917 Normal;}{\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 \snext1 \slink15 \sqformat \spriority9 \styrsid13517917 heading 1;}{*\cs10 \additive \sunhideused \spriority1 \styrsid13517917 Default Paragraph Font;}{* \ts11\tsrowd\trftsWidthB3\trpaddl108\trpaddr108\trpaddfl3\trpaddft3\trpaddfb3\trpaddfr3\trcbpat1\trcfpat1\tblind0\tblindtype3\tsvertalt\tsbrdrt\tsbrdrl\tsbrdrb\tsbrdrr\tsbrdrdgl\tsbrdrdgr\tsbrdrh\tsbrdrv \ql \li0\ri0\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs20\alang1025 \ltrch\fcs0 \fs20\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 \snext11 \ssemihidden \sunhideused Normal Table;}{*\cs15 \additive \rtlch\fcs1 \ab\af0\afs48 \ltrch\fcs0 \b\fs48 \sbasedon10 \slink1 \spriority9 \styrsid13517917 Heading 1 Char;}{\s16\ql \li0\ri0\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \ab\af0\afs56\alang1025 \ltrch\fcs0 \b\fs56\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 \snext16 \slink17 \sqformat \spriority10 \styrsid13517917 Title;}{*\cs17 \additive \rtlch\fcs1 \ab\af0\afs56 \ltrch\fcs0 \b\fs56 \sbasedon10 \slink16 \spriority10 \styrsid13517917 Title Char;}{\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 \snext18 \spriority0 \styrsid13517917 Script ;}}{*\rsidtbl \rsid3088390\rsid4943407\rsid13517917}{\mmathPr\mmathFont34\mbrkBin0\mbrkBinSub0\msmallFrac0\mdispDef1\mlMargin0\mrMargin0\mdefJc1\mwrapIndent1440\mintLim0\mnaryLim1}{*\xmlnstbl {\xmlns1 http://schemas.microsoft.com/office/word/2003/wordm l}}\paperw11906\paperh16838\margl1440\margr1440\margt1440\margb1440\gutter0\ltrsect \widowctrl\ftnbj\aenddoc\trackmoves0\trackformatting1\donotembedsysfont1\relyonvml0\donotembedlingdata0\grfdocevents0\validatexml1\showplaceholdtext0\ignoremixedcontent0\saveinvalidxml0\showxmlerrors1\noxlattoyen \expshrtn\noultrlspc\dntblnsbdb\nospaceforul\formshade\horzdoc\dgmargin\dghspace180\dgvspace180\dghorigin1701\dgvorigin1984\dghshow1\dgvshow1 \jexpand\pgbrdrhead\pgbrdrfoot\splytwnine\ftnlytwnine\htmautsp\nolnhtadjtbl\useltbaln\alntblind\lytcalctblwd\lyttblrtgr\lnbrkrule\nobrkwrptbl\snaptogridincell\allowfieldendsel\wrppunct\asianbrkrule\rsidroot13517917 \newtblstyruls\nogrowautofit\usenormstyforlist\noindnmbrts\felnbrelev\nocxsptable\indrlsweleven\noafcnsttbl\afelev\utinl\hwelev\spltpgpar\notcvasp\notbrkcnstfrctbl\notvatxbx\krnprsnet\cachedcolbal \nouicompat \fet0{*\wgrffmtfilter 2450} \nofeaturethrottle1\ilfomacatclnup0\ltrpar \sectd \ltrsect\linex0\headery708\footery708\colsx708\endnhere\sectlinegrid360\sectdefaultcl\sectrsid13517917\sftnbj {*\pnseclvl1\pnucrm\pnstart1\pnindent720\pnhang {\pntxta .}}{*\pnseclvl2 \pnucltr\pnstart1\pnindent720\pnhang {\pntxta .}}{*\pnseclvl3\pndec\pnstart1\pnindent720\pnhang {\pntxta .}}{*\pnseclvl4\pnlcltr\pnstart1\pnindent720\pnhang {\pntxta )}}{*\pnseclvl5\pndec\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{*\pnseclvl6 \pnlcltr\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{*\pnseclvl7\pnlcrm\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{*\pnseclvl8\pnlcltr\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}{*\pnseclvl9\pnlcrm\pnstart1\pnindent720\pnhang {\pntxtb (}{\pntxta )}}\pard\plain \ltrpar\s16\ql \li0\ri0\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs56\alang1025 \ltrch\fcs0 \b\fs56\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 BIS130 - Transcript \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Welcome to the Bitcoin Infinity Show, brought to you by BitBox Stampseed, the Bitcoin Advisor and ShopInBit. Enjoy the conversation. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Welcoming Obi Nwosu \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Obi, welcome for the first time to the Bitcoin Infinity Show. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 well, \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 We rebranded. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 what is time in infinity? No, no, it's the second time, great to have you back. yeah, we have, it's been a wild ride and the journey is just beginning. So yeah, thank you. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 The Launch of Fedi \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917\ \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 so Fedimin launched, two weeks ago. Is it the Fedi \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Fedi, launched? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 launched? Yeah. These terms. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 no, no, Fedi Mint launched, effectively Fedi Mint launched nearly five years ago. FediMint is a very old technology, very, you know, the first, the first FediMint transaction, where someone used FediMint e cash over Lightning to buy a cup of coffee, whic h was after, you know, a year plus of development was on, I believe it was the 3rd of the 8th, 3rd of August, 2021. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And so we're trying to, like you have a Bitcoin Infinity Day, we're suggesting, that was actually Erik, my, the inventor of Fedi Mint. from Parinelli Police, just actually, and so I like to think of that as e cash coffee day. Cause actually it was like, you actually bought the cup of coffee with e cash. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 so yeah, but yeah, Fedi finally launched two weeks ago. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 All right. so I think, for those who haven't seen the previous episode with you, if they want to know more about you, we should probably go back to that episode, but I think you're going to have to do the TLDR on what Fedi is for our listeners. Like that 's a good start, I think. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So yeah, and now we can be clear about what Fedi is. And so Fedi, is two things still. Even Fedi is two things. One is the company called Fedi and the other is this product called Fedi. So if we talk about the product that people have on their phone, Fed i is a community super app. And so it's an app that takes the best of freedom technology. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 it's got Bitcoin functionality in it, Lightning connectivity, obviously FediMint for handling community custody. but it's also got Nostr support and any other freedom technology that's out there that's mature and reliable. We've taken the time to integra te into one simple to use app. So it allows you to have chat. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 We use Matrix as this federated, decentralized, encrypted chat protocol. It has money with the combination of Lightning, Bitcoin, and Fediment and more. So it has a built in web browser inside it. And therefore you can access all of the Bitcoin ecosystem of apps from Bitrefill to Unleash. chat to BTCmaps and beyond. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 All in one place. So you don't have to have this smorgasbord of different apps and tabs open one app to use them all. And the app itself, we announced as well, is now source available and will eventually be open source as well. So we're trying to make th e best of it. portal into the freedom technology space. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So that's Fedi. And then Fedi the company builds the Fedi app. And we also have something we call the FedEye Order, which is, this selection of incredible people, FedEye Knights, who are on the ground and they, you can think of them as like a Decentraliz ed genius bar. If you've got an iPhone, you have the genius bar that goes along with the phone. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 The reason why the iPhone is so amazing is not just the phone, but it's also the incredible support you can get. If you can go to an Apple store and you go to the genius bar, they can help you. we have that instead of it being in, you know, Fifth Avenue or Oxford street in London or so on. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 It's in, the capital of Togo or Uganda or. Guatemala, or so on. On the ground, they will locate communities, they will educate communities. and they will support communities on Bitcoin, on Lightning, on FediMent, on all of these different websites and se rvices that are out there to provide that sort of support that's needed for the communities that are outside of the existing Bitcoin space. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 How Federations Work \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Okay, great. so how does a federation work? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 so the first thing you have to do, wherever you custody is where you transact and do and you live and so on, which is why. Banks try very much when you're young to get you to hold a bank account with them because they know that most people never leave an d then all other services are provided. So how do you actually custody? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 For many people they've had two choices. Either they do everything themselves and that's the best if you can do it just like it's the best to be able to build and fix your own car or house but not everybody can do that but that is always the best because no one's going to love you. And put as much care in as yourself. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 The other extreme is to fully outsource it, fully give it to some private party, which is actually what ends up 95 percent plus people doing, and that's putting their money on a Coinbase or some other centralized service. and the same with communication. They would use some sort of centralized service. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 They would use a WhatsApp, an X. com, a Telegram, a WeChat or so on. They would use some centralized chat. And if you think about it. Our lives are communication and money and value. So both those things, most people outsource, some people take it in hou se. If I want to set up a federation, which is to do with the custody of the money, where FedeMint is this middle, middle house, I can find within my community, a number of trusted parties. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 We call them guardians. So let's say. You found us three plus, you know, your great t shirt, Greg Voss. The minimum we suggest is four for various Esoteric reasons From a cryptographic security point of view we suggest four, but you can have seven You ca n have you can keep growing you could have we've seen people have seen Federation stood up with as many as 40 people in them And it will get slower and slower if it gets beyond that, but, but technically you can. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 It'll be this, it'll create this huge multisig, i. e. multiple people have to sign before you do a transaction on chain. And so multisig starts to get expensive of a certain size. But let's say us three plus Greg. We would FedeMint software. we would dow nload the 30 minute software onto a machine that we have spare, and we would set up and run it. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 The setup process will, part of it will enter the information about the other three. And we make that very simple, it's a web interface, you point and click and you get a code and you share that code with the other parties, everybody shares the code of e ach other. Maybe you go into a group chat and paste each other's code. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Everybody copies each other's, enters it into our own FediMint and then they connect to each other and they form a federation. As long as you keep that box, running, connected to the internet, and connected to electricity, the federation, for each, all t he four, the federation are one. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 But because it's a federation, if one of them, for example, had a power cut, or lost their internet, or had to change their domain name, or something like that, The other three will be able to continue and operate. Yep, so you've now created this communi ty custody platform. Now, anyone with the FEDI app or any other app that supports the FEDIMINT protocol, Webimint, and we're hoping that many others will set up FEDIMINT wallets, like there are multiple Lightning wallets in future. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Any FDI min wallet compatible wallets like Fedie, can connect to your federation At the end of setting up the fed min server will show a QR code and the string that represents how to connect to your Federation. So you could take your Fed app, or the Muti ny wallet, or Web Mint, or any other, fed mint compatible wallet, and you'll scan that QR code. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And you've now connected to that federation and that federation becomes, you can now use it to custody. Now, what will happen is, if for example, someone wants to send money to you, you would, just as if you're using a Bitcoin wallet, let's say it's on c hain. you would say, I want to receive, enter the amount and it'll show a QR code. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Someone else who's using a normal Bitcoin wallet will scan that code and send over the Bitcoin main chain money to you. But what's actually happening is your Fediap is communicating with the Federation. Your Federation is creating a Bitcoin address for y ou to send to and sends it back to you for you to display. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Okay. And then a user, someone else who's using a completely different wallet will send money to that address. Actually goes to the federation and they, the four of us combined will process that and create e cash, which is like a token representation of the \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Bitcoin. And then the e cash will be sent to you. But the way it, the way it's sent is completely privacy preserving. So the guardians have no way of knowing who they are providing that service for, who's receiving the money. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 There's full privacy. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 All right, and neither does the sender, I assume, like the sender doesn't, that they sent Bitcoin to us and address. They have no idea who, so if there are, let's say we set this up and we're using it for our friends and extended family and in total, the re are 40 of us or 50 of us \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 When you send to that address, there's no way to know out of those 40 or 50 people who received it or who requested it. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 All right, so, a bit about the guardians and the multisig, that's obviously because you don't want to have a single point of attack for each, federation, right? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 point of failure, \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 A single point of \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 the more likely thing is that someone's machine, if you had one machine, the most likely thing that will happen, almost guaranteed, at some point you'll have some sort of power cut or internet cut. Internet cut is probably the most likely you'll, you'll have a glitch on your internet for 30 minutes. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 If you do, Everyone using your federation won't be able to use your system for 30 minutes. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 but it's also an attack vector. Like if the, if the, if there's a lot of money in the federation and, so there's, there's an incentive to attack the guardians. Like, can you be completely sure that the guardians don't know each other's identities and stu ff like that? Like how, I know you think a lot about the attack vector. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So I'm like, can you go into that a bit? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 can't be completely sure of anything in life. So the answer to that is automatically no. Can you be completely sure of something? but, it depends on the Also, there's an assumption that you have, that the people don't know each other. Cause I think very often in, there's two types of scenarios. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 It could be that each party completely doesn't know each other, or the more common scenario will be that you're some community or some group of friends. And within you, you've decided. Of the people who are my friends and family and so on, these four peo ple are the ones who are consistently the most reliable, the most trusted and so on. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 They do know each other, and you know who they are, and it's because you know who they are that you're comfortable with them holding. they're the Uncle Jims of the family. they're known to be reliable. They're known to be people who care about their frie nds and family. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 that's very often actually what we're seeing is the more common scenario than the ones where people are completely, anonymous to each other. But as it matures, we may see the other scenario happen as well. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 The Uncle Network \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 It's a literal uncle network. I know Uncle Rockstar started the uncle network here on infinity day. Yeah, you got the brother Luke, and so that's four, so we're
\par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 are you an uncle? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 am an uncle officially now. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 an uncle as well, are like, but dubbed by Uncle Rockstar \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 I haven't been dubbed I, so \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 you are a good candidate. candidate, but I am biologically now, an \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 oh, congratulations, \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yeah, \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 How Fedi Launched \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Okay, well, I think we are looking just to dig in more about Fedi Fedi Mint and, what does your launch actually mean? Because the app has been in beta for quite a while, right? what's happened, to make it that you can launch? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yeah, that's a very good question, because, we, the app from the, if you just focus on the app, from the previous version to the one we went live, there are only a few, changes. It was more about, did we have enough feedback from enough people on the gro und that we thought that the product was stable enough, reliable enough? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 behind the scenes, we've done a lot of internal plus from trusted friends, external security audits of different elements as well. I don't like to publicize it because it's just something we do. We don't think it's something you should promote to saying, Hey, look at what we're doing. We just try to build the best that we can. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 and the really, big thing was to just say, a lot of people ask, is Fedi ready? And we wanted to get to a line where we thought it was good enough. And we got to that line. And then, we also wanted to have enough proof points in, the world. And again, we got to that line. So these things were separate things that were happening. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And finally, it was very clear to us that we wanted to make the software, Ultimately open source. And that was a big call because, you know, we raised 21 million and, normally you go two routes. You go, you raise a little bit and you stay open source and so on. Or you raise a lot and you stay closed source. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 We believe that, over time, it's going to be considered, over the coming years, it's going to consider that you should always go open source no matter what you're doing, but we're in a transition. Five years ago, raising this much and going open source w ould be considered crazy, in five years time, raising this much and not being open source would be considered crazy. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And we wanted to be, afforded in that. So. We actually went source available. It's called a business source license. So it means you go source available and you set a date where you must go open source or earlier. and we set those. So we cannot change it now. We cannot say we're going to actually change our mind. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Well, the only thing we can say is that we're going to go open source earlier. that's the only thing we could do. Or if we decide to shut down, it's automatically open source as well. That's the sort of dead man's switch as well. Or we decide we're no lo nger going to develop the software. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 we've added caveats like that, which are not optional, but actually add more restrictions. So no one's going to complain with us going open source earlier. that was agreed and put in place on May the 4th. So May the 4th we review of this year, 2024, just for posterity. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 we, got enough proof points from different markets, that we felt that we're onto something here. Does that mean that we've finished? No, there's a lot of work to do, but enough to say that the idea of taking all of the best of freedom technologies out th ere. And putting them into one place and one app that's easy to use is something that's compelling to people. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And also we had enough to see the federation model. of this sort of really simple to use and privacy preserving multi sig is also a powerful model. So the model was proven out. And then finally the software, we got to a point where we thought, it's, of c ourse, we've got years of more development, but it was good enough as well. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 I think that was the final piece. And we thought, okay, we're ready to go. And we then set a date a few weeks after that. But even when we were getting close to it, we started the process of shooting a video because we just wanted to show people are wond ering what were we doing for the last nearly two years and we wanted to show that as well. \par\ \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 what's the synopsis of the last two years? Like the big highlights? \par\ \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 so, I always say there's three phases in the business. There's initialization, of a startup, initialization, market product fit, in our case, not product market fit, I can go into why. And then, growth. And so, this phase that was, the end was finally, w e crossed the line, on August the 6th, 2024, was the initialization phase. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And so, if you think about the analogy of, like you wanted to have A shop selling designer pet clothing, and you've decided you have this crazy idea and you have to first fund it, find the people to build it, and then find the place, set up the store, ma ke the clothes and, open. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 That's the initialization phase. And then once it's launched, you then. Start figuring out, okay, people come in, there's initial, interest, and then, you have this trickle of people coming in, you have to figure out what do they like, what do they not l ike, what do I have to adjust until it becomes this sort of regular viable business. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 That's the market product fit phase. And then you start saying, okay, I've got something that's working fully and then I will repeat it, make more and more and more, Widgets? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Doggy fashion, Excel stores, whatever you want to call it. the last two years was our initialization phase. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 we had this, amazing product with FediMint. we had this initial set of, crazy people with Erik, the inventor of FedEvent, Justin, who's, who was also incredible engineer, who was actually the one who suggested that we make a commercial enterprise. up unt il that, both myself and Erik just suggested it would be an open source project. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And then myself as well with my just, you know, only maybe six or seven months before we were finally finished selling. a Bitcoin exchange, the UK's longest running Bitcoin exchange. and so having that experience of building a company that was profitable and understanding what it meant to build something that custodies a large amount of money for people and provides them services is easy to use and all that sort of stuff. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 and everything around that customer service, everything around that. So, we were there, I had a visit to the Oslo Freedom Forum, and that was the catalyst. we did one talk at, Bitcoin Miami, and, Alex Gladstein saw that, he suggested I go to Oslo Freedom Forum. I went, my mind was blown and I also realized whenever you're thinking about a business, you have to always think about chicken and the egg and how do you find your initial market for eventually this product is applicable to everybody everywhere , but who's the first use case that has a demand so high that they're going to willing to go through the really buggy early versions and help you. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Stabilize it to the point where it's something that people can click a button and it works everywhere. I realized that the community of human rights defenders and later on also humanitarian organizations fit that, need. We really cared about that need an d we were concerned, we wanted to help, but we realized that this product could help in combination with the rest of the Bitcoin ecosystem. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 That's what's quite cool. FediMint is the thing that handles the custody, but you still need to buy things, sell things, find things, and so on, and that's where the Fedi app also comes into play, but without FediMint as the core to handle the custody, t he rest didn't make sense. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Then we started, it was, then you had this sort of scene from like the Magnificent Seven or so on where you're, you're finding your initial team members. So we found Renato Rodriguez, I chased her for like six months ago. She should have, you know, got a restraining order for six months trying to get her to join. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 just if you look at the initial team, it was just everybody, the whole team is amazing. But it was just trying to find these incredible people. they tended to just immediately understand the value proposition and the market we were trying to help and wer e already doing incredibly well in their own careers, but there was something missing for them. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And when they saw this, it was like this fulfilled There's some other need that they had beyond the monetary need. The potential was amazing, but the mission side of it was what helped us bring on this incredible team. So I believe in philosophy, people, process, product. The philosophy was amazing, who we're helping, the potential, it's helping people and in so doing we're helping Bitcoin, in so doing we're helping the world. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And that's a powerful philosophy and mission and that attracted this incredible group of people. And if you've got the philosophy and you've got an incredible group of people, they will put in the processes that will lead to the right product. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 It's like, let's say the video, for example. I said to Renata, I want a really powerful launch video and it should be like the best Apple keynote speech combined with a UNICEF or Save the Children commercial. That's it. That's the whole brief and that wh ole video. And somebody says, you need to go to Madeira. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 You need to say this. And I just woke up and I say what she says. But the whole elements of it, all of it was her and her team, Mary and marketing and everybody building that over the following X months. and I didn't actually see the video myself. Until less than a month before we launched it for the first time as a rough draft. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And it was just basically perfect. My comments were like, I actually didn't have any significant comments, but that was the same for most of the team and the design of the product. We had this incredible designer, Skylar. I would give a brief and so as, Erik's brief was, I just want to be proud of something that I should be proud of, and that was it, you know? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And I was like, it just needs to be really simple. And that's the high level. And I might give comments on a little bit here or there, but in general, whenever he gave me it, I would say, well, he Skylarized it, like just Skylarize it. And he would just come up with something that was great. and I think that was the last two years. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 We had the team we raised. again, the choice of investors was really, really key. I was very, very sure, especially from my previous experiences, that I only wanted Bitcoin on the investors, especially for the first couple of rounds. And when I've someti mes do talks on how to set up a Bitcoin company, my first slide says don't do it, but instead sort of a Bitcoin business, not a Bitcoin startup. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And I explain the difference between the two. but one part is, if you do want to raise capital, be really careful about your choice of investors. The wrong investors will, well, and they don't mean to, but they will kill your business without meaning to, but the right investors will. So, we were really, really careful about our choice of investors and the initial team and then the initial team brought on the rest of the team after that. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And that was the last, that's the last two years we've set ourself up very well. I did, being a classic entrepreneur, think it'll take six months, took two years. So I, so my estimation on that was a little bit off, but the end result, I'm really excited about. And now, now we're, now we're off to the races. \par Great news, everyone! Bitcoin, the inverse of clown world is out now. It's the successor to everything divided by 21 million. And it's based on the last two years of podcasts that we've done together. So if you like the show, you're going to love the book . Find the book on bitcoininfinitystore. com or on Amazon. \par That's right. We have our own store now. BitcoinInfinityStore. com. You can find not just books, but merchandise based on everything divided by 21 million, check out Bitcoin, the inverse of Clown World today and buy some other stuff while you're there too . \par This show is brought to you by Bit Box, our favorite hardware wallet. It's Swiss engineered and has all the most important security features to keep your Bitcoin safe while keeping a user experience that even your grandma can use. So visit Bit Box. Do Swi ss slash Freedom to learn more, or use Code Freedom at checkout for 5% off. \par And remember, it's the Bit Box zero two Bitcoin only edition. Make sure to get that Bitcoin only firmware. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 How does Fedi Make Money? \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 How does the app make money? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yeah. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 For the company? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 if you use the app, whenever you use the Freddie app. whenever a transaction happens, which would have occurred a fee. So it's a Bitcoin transaction, e cash or a lightning transaction. We add on an additional fee, 21, 21 basis points. So 0. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Oh, yeah, \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And so, and the good thing is because we can charge in sats and I believe actually even fractions of a sat, it's a progressive tax, which a fee.
\par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So what I mean by that is. If you're sending, let's say 100 through, then you would be charged on 100. 21, but if you're, worth of value, but if you're sending through 1, then you'll be charged 0. 21 cents. And if you're sending through 0. 10, you'll be charged 0. 20. 0 to 1 cents. So it'll always be a very small percentage of what you're sending. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Now, people might say in certain countries, don't they have mobile money and so on. But the problem is those mobile money systems have minimum fees. And it might be, 1%, which is not that bad, say. And it might be, even in some terms of scale, it could b e half a percent, but with a minimum fee of 20 cents. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So if you're sending a hundred dollars, that's okay. But if you're sending, 1, that's 20%. And so if you have someone who has a monthly salary of. 10 in some of these markets, that 0. 20 fee starts becoming quite a significant per transaction hit. So the refore it becomes unaffordable for you to use mobile money. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So even though it's prolific above a certain wealth level, and so that leaves many people out, in the rain. But because this is progressive, if you're selling 10 cents, the, fee will actually round to zero. I mean it will be a fee, but you'll see it in s ats, but if you were showing, trying to show it in local currency, it would basically be, it'll say about zero and then you click and you realize it's this small amount of sats. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 so, yeah. the big thing that I'm thinking of if I'm like. Playing this out in my head with where this could be in 10 years, like you could run entire virtual nations on a federation, right? If you have the money and the communication and whatever other u seful apps, \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 I think the big thing I think is, if you look at the internet, there are large organizations where, people use and they're highly centralized. You have a few people who may be wealthy enough to have their own direct connection to the internet, but the ma jority of people are connected on the internet. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 I don't know at this stage, millions of intranets, like household intranets effectively, company intranets and school intranets and so on, where it's one connection to the internet shared by multiple people. That's actually the majority of people. And it 's that middle ground between these huge mega organizations that people are connected to one mainframe. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 With millions of users, I think there are very few of them now, but that was the denominant way at the beginning. It was these huge, centralized ways of connecting AOL, CompuServe, and so on. Now, they're actually relatively rare, but that was at the beg inning. All of the internet was that. A few centralized parties, and I would liken them, conceptually in value terms, in value custody terms versus information custody terms, to, a coin basis. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And also there were a lot of hobbyists who had their own direct ISDN connection to the internet. but now most people connect through these intranets where they get one router, one connection, and they share with everybody in their household. That would b e a criminal of the Uncle Jim federations or in their school or in their football club or in their office. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 That's probably 95 percent of people and I think that this approach of federated model from the size from. Five or six people up to five or six hundred thousand, that range can cover 80, 90 percent of usage. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 How to Use Fedi(Mint) \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Can we go back to the basics of how feint works in the perspective of someone actually using this thing? So, you explained to us last time how it works, but just for my own sanity, check that I got it. if you are sending e cash within the federation, tha t is just. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Direct between two users. There's not even a record outside of that. No one knows those transactions are even happening. Is that essentially correct? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yeah. So the federation helps you mint technically, because actually the user creates their own e cash, they create their own e cash, but it's unstamped and then they give it to the federation and they stick in an envelope. And they give it to the federa tion with some carbon copy paper on the inside the envelope as well. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 the federation collectively signs. So let's say all four people go stamp, stamp, stamp. And that makes it valid. then they give back the envelope to the user. The user then opens the envelope with the cache that they created, just some random piece of da ta. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And they now have this Ucash, but the Ucash they've created now has got the four stamps on it, say, for the four of us. And so anyone else in that federation, any other, person who's also connected to the federation. They can just literally, directly giv e them this, random set of data. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Let's say it's a picture of a fashionable dog and they can just give it to someone else. and the person will receive it and they don't really care what the data says. They just look, are the four stamps on it? Yes. Then it means it was stamped by the Fed eration, which means it's backed by a certain amount of information. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Actual Bitcoin. Yeah. So take the whole, the full path. Someone deposits some Bitcoin in return. They also, along with the Bitcoin, send them an envelope, give them an envelope with this random piece of data in it to the Federation and the Federation rec eives the Bitcoin. Okay. I've received the Bitcoin envelope. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Okay. I've received the Bitcoin. I will stamp. I received one, let's say. 10, 000 Satoshis. So I'm going to take my 10, 000 Satoshi stamp and stamp this envelope with 10, 000 Satoshis, pass it around to the other four, they all stamp the 10, 000 Satoshi stamp. And then give that back to the user. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 User opens the envelope and says, I've got, okay, I've got an e cash note with, with, that's been proven that the, that it's been validated by the guardians. So as long as we all trust the guardians are holding that and that they will honor this and rede em. That's it. So now I can pass it to anyone in the Federation. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 They receive it. They look at this picture of the cute dog, but what they're really looking at is, is it got the four stamps on it and it's 10, 000. So that means I've now received 10, 000 token. They can now at some point in the future, Often they do it immediately if they've gone into connection, but they don't have to. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 They can give it back to the Federation. Federation will receive it and each one will check their own signature of the guardians. Okay, it's properly signed. Therefore, I'm willing to, and they might give them a Bitcoin address to send the money on chain to. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So they will receive it, it looks good, they will then, record that this, e cash note has been spent. But they don't know, of all the e cash they received, which one it was, because each one they received in the first place was in an envelope. So was it the first one they received, or the middle one they received? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 They have no idea. It could have been received yesterday or a month ago. No way. All they know is, I must have stamped it, so it was one of the ones I stamped. And then they will look at the address the person's asking to send the Bitcoin to, and they wi ll take some of the Bitcoin that they're holding in the multi sig that we're holding between the four of us and send it to that address. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So that's called Redeem versus Mint. Now, the user experience from a user, we can get onto Lightning, that's another level of complexity, but it's simple just for Bitcoin and eCash for now. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Someone sends me Bitcoin or I send it to myself from an outside wallet and I receive e cash. And then someone else in the, in the federation wants to, once I want to pay them some e cash, they will give me, they will give me a QR code to, to scan to pay and I will scan. And literally the e cash that's on my phone gets sent to them directly. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 From me to them, one to one, that person when they receive it could keep it on their phone or they could say, you know what, I want to send that back to the federation and they can send it back to the federation and then the federation can destroy that, issue them new, fresh e cash in different denominations, maybe not 10, 000, but 10, 1, 000, you know, just like with notes, you could go and get change. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yeah, because if someone transacts, if you're saying it gets sent from one computer, phone being a computer, whatever, one device to another, well, that original device would still \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yes, \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 copy of the thing on, right. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So they will still have a copy. Now you are in the same, this is where the community aspect works, you are in the same community, If you're in the same community, and the person, it's a merchant and you receive, and your phone will remember when you rece ived what e cash, yeah? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Even though it's private, you do know this e cash was received at this time and this time for, and so, especially when you integrate with points of sale, it will say, well, you received this e cash for this purchase. You'll know that. so then if you go t o redeem it, at the end of the day, and some of it doesn't match, you will know as the merchant, which e cash was involved in that. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 You'll say, well, the e cash involved in this transaction. And that transaction was with John. So you've got proof of work. it's the same as if you have a merchant and you receive cash and then you finally got the end of the day to a bank. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And some of the notes are counterfeit. Now, you don't find high levels of counterfeit notes in a community where people know each other. It's normally in these widespread communities. But in those scenarios, what most people will do and how the default w ay the app works is the moment you receive it, it immediately goes off and redeems it and then issues itself back new, new change. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yeah, that seems like a good default implementation. but if you have no internet connectivity, you can still use it and still receive. even if you can't send over the internet, you can create a QR code, which contains the e cash in the QR code, and the p erson can literally scan it and receive through the screen. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Because as long as it's the QR code, the e cash note is just some text. So a QR code can represent that text and you can scan it, even if you have no data. So for example, it could be you're in an area where you have no data, rural, Latin America or so o n. But it could also be something more innocuous. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 You could just be in a big sort of, But the thing is is that you might be at a Glastonbury like concert and there are a thousand phones and there's no data. Or you're in an indoor conference place underground and there's no data. But you can still take p ayments or the merchant has internet because they're the ones who really need it. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 But the buyer doesn't and so in which case the merchant has internet because they're connected wired in because they're fixed, but the buyer doesn't need to have internet to pay and the merchant will just take a risk just like in most merchants in high s treets they accept a certain amount of breakage and a certain amount of transactions are gonna be charged back by, credit card companies and so on. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 I used to be a CTO for a major pan-European, online auction company. At the time I was competing with, eBay and so on. we were in a headliner, 300 hundred people working for me in technology. It was a very big technology offering. And we were doing milli ons of transactions a week. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 It was very high volume. And in those e commerce sites, you just accept a certain amount of breakage, a certain amount of returns, and a certain amount of chargebacks, even if you do nothing wrong and you just factor it into your costs. For the benefit o f the simplicity of the experience. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Fedi and Nostr \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 you mentioned Nostr before, like, what's the marriage between Fedi and Nostr? Well, I would say right now, we are, because I think. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 we're beyond dating. We're engaged. But we want to really take the two footed tackle of no return, to use a football euphemism. a web of trust thing, right? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yeah, I think, whenever, from the first point I saw Nostr, a lot of people thought it was just social media and so on. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 I think social media is Trojan horse is the wrong word, but it's the, initial vector by which it infiltrates communities. But what you're actually doing is building a simple, trust system and a simple discovery system. It's a form of decentralized search and it's a form decentralized identity. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Cause you, to search, you have to identify things to be able to search. So they're sort of two sides of the same coin. now the first thing you're using it for is identifying people who want to speak publicly and share their thoughts and so on and so fort h and follow them and give feedback and like. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 But it always seemed to me to, way more powerful than that. And I think now people, generally understand it that way. And so, What we've already done, in Fedi, and a lot of developers really like the way it works, if you sign up to Fedi, or if you downlo ad the Fedi app and start using it, you, first of all, you don't need to give your email, you don't need to give your phone number because it's not required, but, we do ask you to come up with some sort of Username for yourself. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 That doesn't even have to be unique, by the way. We will add a unique element at the end, from it. But what we do is, whenever you create that label, which you can change the name, but we create, an NSEC, which is a Nostr, identity effectively. A unique identity and we automatically create that for you. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So again, for our users, we don't want to start educating them on the history of Austrian economics and Bitcoin and inflation at the beginning or a Nostr, et cetera, and how it works and relays. And we just want them to start using it. then subtly over t ime we expose certain features of it. So people become curious and then eventually. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 You want to learn how this thing that's delivering value works, but we've put proof of work first, proof of talk second. So we educate through letting people see the benefits. And then there might be some people might say, well, how does this car thing w ork? Or how does this fridge thing work? But I don't need to know how refrigerant works to be able to use a fridge or how microwaves work to use a microwave. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 When they want to know how all this stuff works, but we benefit first. So, and so and that's how it works with Nostr We immediately give you an NSEC. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And so because we've got that if you go and use unleash. chat, for example within the app It will go and you click login and there's one option login by Nostr You click that and it'll just within the app pop up something saying Nostr Do you want to log i n with Nostr? And you click yes, and you're logged in and it just works and then you, and then also now you're logged in and then you can, and then you click, deposit money and instead of having to go to a different app, copy and paste the QR codes, it just, it pops up and says, do you, this, this, what the app's asking you to deposit this amount of money? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Do you want to go ahead? Yes. And then it's e cash. Is, is converted into lightning and then that you pay by lightning. But from your point of view, there's a circling key for three or four seconds. You have now credited your account. Do you want to with draw the money back account? You click withdraw the amount. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Three or four seconds, it's been withdrawn to your account and, and it's all within the same app. so, but that only works because now if you, close the app or delete the mods, because you can delete these mods or these additional pieces of functionality, they're basically webpages, but the icon for them, and they have an app like experience, but they're actually just webpages. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 and then you go away and then you delete the app from your service. Like six months later, you come back, you, you, you enter your 12 words, you're, you're re log on. And then if you scan to join a federation again, it will recognize that you were a memb er of the federation before, and it will reconstitute and recreate all your e cash and put it back on your phone. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And then if you click on, Unleash your chat or Stacker News or anyone that supports logging by Nostr. Your login with the same details and so on. So you basically, and we want to make that even more seamless. So from 12 words, your entire life can you th ink about moving from one mobile phone to another, where you have to move all your apps, your banking apps, your chat apps. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And now you could do that with just go and also try moving from an iPhone to an Android phone, Android to an iPhone. It's a nightmare. Here you could just download the Fedi app on your iPhone. this is some far point in the future. You don't have just cha t, but you also have voice. You have video, all of that running from encrypted chat. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 12 Magic Words \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 you have access to money from, custody and payments. You have access to all these apps and then you back up 12 words. And there's something we call social backup, which is mind blowing, but, that's in beta. But let's just say backup 12 words, and then yo u delete that app, go to a different phone, could be an Android or an iPhone, and you just enter 12 words, and your entire thing comes back. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Not partially back, but it all will come back. based on just those 12 words and that's only made possible because of Nostr and we want it over time. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 mean, when you think about it, it's insane. It's already insane with bitcoins, with the 12 magic words, because like every time I pass a security check at an airport, I think that go ahead, have my 200 milliliters of toothpaste. I'll, I have my 12 magic words, like it's the ultimate fuck you to, to anyone trying to meddle with your business, right? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 that's the dream. I mean, we're not fully there, but it's, I would say it's like, we're like 90 percent there, but to extend beyond just your Bitcoin, Nostr is the protocol that allows us to do that because it's notes and other stuff and the other stuff can be, an encrypted version of the settings and so on that you have that we can store and be willing to pay for. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And then when you recover, you have your bitcoin, but then you can go off and send a request to say here, I'm willing to recover this file. Here's some zaps for the file and you get the file back and that additional file then contains the information. Ok ay, these are the federations you are a member of, you rejoin them. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 These are the mods that you had, they're reset up. These are the settings you had, they're reset up. And then you log on them automatically using Nostr as well, the NSEC and Nostr login. from your point of view as the user, 12 words, it's back. I mean, y ou might have to drink a cup of coffee while it's happening, but 5, 10, 20 minutes later, it's back. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 it's amazing, and it's an inheritance plan. Like, you can live forever by just letting your descendants, giving them the 12 words when you're on your deathbed. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 backup also becomes really powerful, because social backup means that, cause the 12 words is still another thing to secure. And it's sort of one of these turtles all the way down type scenarios. Okay. We've got all this incredible security Fort Knox like , but behind them, but I walk around the back of the Fort Knox is these 12 words that's stored. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 you also give one to your cousin and you say, look after this as a backup. And your cousin stores it on a fridge magnet. You know, you don't know, or you don't know your, your, your security is the lowest common denominator. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 For your 12 words. And \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 is never stronger than the weakest \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 then the weakest link. And so with social backup, which is definitely an early beta. what we can do is use the power of the federation where we can take your 12 words, encrypt them and then split it up between the four guardians in this case, or seven gu ardians or 40 guardians or whatever. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 For larger federations, and they all hold a piece of your encrypted piece of your, of \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 is important here. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yeah. \par Knut, what are you doing over there? I'm stamping my seed. Everyone tells me I should, that it's good for bitcoin security and whatnot, and that I should go balls deep into bitcoin security, so I'm stamping. You don't do it like that, Knut. You don't stam p that seed. You stamp your seed phrase. What? Your seed phrase. \par Oh, so that's what these things are for. oh, I get it now. That's exactly right, Knut. And you can get everything you need to stamp your seed phrase at stampseed. com. And be sure to check out our limited edition Everything Divided by 21 Million Titanium Seed Plate. \par And use code INFINITY at checkout for 15 percent off. That's fantastic! And it hurts way less! \par\ \par\ \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Redundancy in Fedi \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So this gets me back to what happens when one of the guardians drops off, and if it's like in a permanent way, if that one guardian is holding a piece of everyone else's 12 words, does everyone \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yeah. But it uses a prot, this is crypto, where cryptography comes in. So it's not like. We've taken your 12 words and split it up free between four guardians. Instead, you encrypt it using a scheme that allows each one of the four of us to have a crypto graphic piece. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 But as long as any three of us combine our piece together, we can recombine. It is, it's called, SHAIR Secret Sharing Scheme, but it's a way of cryptographically achieving that. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Excellent, I think you mentioned last time as well that if a guardian does go down, essentially you can replace that guardian, can you take us through that, adding or replacing a guardian if that ever were to need to happen? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 replacing a garden is, probably one of the most complex things. And so you wouldn't necessarily replace a guardian, but what you would do is, some, if someone were to go down, there's two different things. The machine. Or the guardian, the actual person. So if the machine goes down, you can set up a new machine and you can recover the status of that. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 You can, you can download the 30 minute software on that new machine. So that's the actual server that's running. And that will then connect to the rest of the federation and, and carry on. So as long as the guardian has a backup of their keys, they can recover that one machine and, and catch up and it'll automatically catch up. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Just like if you turn off a Bitcoin node and turn it on, it will reconnect to the Bitcoin network and catch up. It's a similar concept. so that's if a machine went down, if a machine was temporarily disconnected from the internet or, lost power, it would just restart and reconnect and you will have zero downtime as a user, as long as it's still running and active. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And this will all be, you'll notice that the performance will still be the same, but if you went into settings for that federation, you'll see that three of the four are running, so one is not running, but that won't affect your usage. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Is the N of M like a ratio, or is it always N 1, for example? It's a ratio. the number of guardians that, you need to have is dependent on how much redundancy. So if you want to be able to handle one guardian going down, then you'll need to have, one tim es by three plus one. So that's four. So that's why you need three or four. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 if you want to handle two going down, then you need two times by three plus one, which is seven. So it's five of seven. 7 of 10, 9 of 13, and so on and so forth. You can have more than that, but the time that you get additional redundancy is every 3, but you can have, for example, 4 of 5, if you wanted to. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Anyway, so, yeah, in the event that someone goes down, that the machine goes down, you can recover. recently there was an issue where one machine, where two federations, had an issue with the domain name for one of those servers. And so if the domain nam e for someone is no longer available, you can now, with the update that came out a couple of weeks after that, you can modify, the domain name \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 for a Guardian 30 minute server, and it would communicate that securely with the other, Federation servers and then reconnect and, continue to operate. But it's important to, even in that scenario where the Federa Guardian, the domain name server went do wn, the Federation itself, Continue to operate because there was still at least free running. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So there was no downtime for the user. Whereas if, if we hadn't been federated, then for the one week or so where that was down, the users would have had no access at all, which would be the case where you're connecting to a centralized or a single serve r, offering. now, if one of the guardians, for some reason, the actual people who are running the Fedemyst server, for some reason, you no longer trusted them, they'd been helpful all their life and all of a sudden they decided, or they've been turned b y some, malevolent nefarious actor. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Then you, if you could in theory pass to someone else, but in practice, you know, how do I know that the other person isn't still going to continue to operate it and so on and so forth. So what you actually want to do is set up a different federation and transfer people, the other three guardians and inform people with a different set of four people. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So those three, plus someone else. And just tell people to transfer their balances across. But transferring balances across is as easy as doing a lightning transaction from one server to another. You can, you know, within the FEDI app, be a member of mul tiple federations at the same time. I mean, right now, I mean, I'm a bit of a power user, but I'm a member of, over a dozen different federations from around the world. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 I mean, well over a dozen, I think, yeah. and as we've, I'm sure there's people in the team with way more than that. but obviously I can't advertise the names because many of them are private federations. So, but there's a few public ones, but there's wa y more private ones. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Interoperability \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So is the e cash, if you're in multiple federations, is it interoperable there, or it's like a more like a, it's a lightning transaction between those two federations, but it's e cash that lives \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 You got it. It's, E cash lives within its federation, but the interoperability layer for most people is not on chain. It's for the vast majority of people, it's Lightning, so, but the user experience of sending e cash from one person to another in the sa me federation, sending e cash from one person to someone else receiving Lightning. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 on a different wallet that's got nothing to do with Ferdie Mint. And finally sending e cash from one person in one federation. To someone else in another federation over the Lightning Network in between is exactly the same. From your point of view, QR co de scan and the system will combination of the Fedi app and or whatever Fedi Mint compatible app you're using and Fedi Mint servers will make the experience \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 I just need to send the person the cash. In this case I can send e cash out over Lightning and that's my job is done. And then the other side would be a Lightning wallet and it will receive. And in this case, I will send e cash over Lightning to another federation, but I don't even know if it's another federation, it's just a Lightning address. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And then the other federation, receives the transaction and the other 30 minute server receives e cash on the other side. But from a user's point of view, this is the thing that also took the two years to make the experience the same. You just don't have to worry about which one is doing. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 The fees will be slightly different. One won't have a Lightning component to the fee, e cash to e cash, but, the other two will because it will be like, in both cases, it will be e cash to Lightning, from your point of view. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So is there a fee to send e cash to someone else in the same federation? No, I guess. Right. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 It depends on the federation. the federation, could choose not to charge a fee and many in these times choose not to because they're doing it for friends and family and so on and the fees are minimal. the Ferryman protocol does support, what we call a DD oS fee. So basically you're spending effort time \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 to sign these notes, the issuing is done by the user, but the stamping takes time. you're signing something cryptographically, that's effort. and you're also doing it in a federated manner, so you're coordinating and then you're all collectively signing.
\par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So, to avoid DDoS, you can turn on a fee and, by our calculations, it doesn't need to be very large, one sat per note that issued is enough to prevent, because if someone really tried to DDoS you at scale, they could, but on normal sort of consumer lapto ps or hardware, they'll have to spend, hundreds of thousands a month at that sort of, one sat per note, and in which case you'll say, fine, you're giving me hundreds of thousands of dollars worth of Bitcoin to burn my, CPU. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Well, not to burn it, but just to heat my CPU. so you can charge a fee. And I think some will experiment with charging a DDoS fee, which is similar to Bitcoin. the fees in Bitcoin are a DDoS protection vector. So it's the same concept. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Fedi's Roadmap \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 All right. So, what's on the roadmap? What's going on? How does the future look like? What will you be working on the next five years? And where do you see FedeMint going? \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 that's actually, the most, fun phase. up until now, we had a hypothesis and we had some early feedback, but a lot of it was based on, A hypothesis and theory as to what we thought people needed and we felt that freedom technology had got to a stage where they were good enough to provide this combined experience. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And that was a hypothesis. And we think we've got early validation, but we built that. Now it's life. And now it's the fun, but it's also the scary bit because we now actually see people using it and we test all our hypothesis. And this is the point wher e you have to be very detail oriented, very much listening to the users and listening to what they say \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 we cannot ignore if there are. Parts of our hypothesis that are incorrect, we have to adjust to support that. So it's going to be a lot of listening and we've already got hundreds of requests for feedback. and then working to rectify, or deal with the qu estions or feedback they've given us or the suggestions they've given us. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 and we're going to continue to iterate and then we bring it back out to users and see what they think. And we keep in that loop. This is the market product fit loop until. The product that we produce, fits the requirements of the market. Now, again, I, I 'm hoping that takes six months or less, just like I hoped it took six months or less \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 for the initialization phase, but it might take less. It might take a bit more, but it's fun. and that's the next phase. After that, we then go into the growth phase. Once we know we've got something that's repeatable, that really. is at the quality leve l that users need for it to be used a daily part of their life. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 We'll then go into growth phase and that's where we'll really, you know, pull down, put our pedal to the metal and, and just repeat, repeat, repeat until. You know, billions of people are using this around the world, but that, that's phase three. And I'm , I'm very focused on this phase. You don't want to rush into phase three. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 We're not going to rush to grow the numbers, until we are very sure that we've got something that's really slick, really reliable, and where we're meeting a clear demonstrable demand consistently. And that process is called human centered design. So it's not focused on this is my app, this is what I want, and I'm going to keep trying to make you agree with what I want. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 this is what we've built. This is our first stab at it, but we're going to keep iterating until it serves your need properly. And that might require some, this is what makes this one very hard because it requires a very different mindset to the phase one . Phase one is like We can do everything and the impossible is possible phase two is really being pragmatic. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Or very self critical and being very open to killing your darlings, as the saying goes, you know, and saying this is not working or, or there's some fundamental issue. I mean, I don't think this will be the case at this stage, but if the feedback was fro m our market that we need to make some fundamental changes that would mean that 80 percent of the code we built has to be thrown away and have to start again. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Well, that's what we're being told. we've got far enough to think that's highly unlikely. cause most of the feedback, like some of the big pieces of feedback cause how can we make it easier to set up federations? So that's a really good sign because lots of people said there's only going to be a demand for like free federations and it's going to be very centralized. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Well, a very large percentage. I don't want to give it. These are the very large percentage of all our queries so far have been, how can I set my own federation up? So even based on those queries, there's not going to be free. You know, I can put it that way. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Super quick question on that, I guess, is it the Fetiman software? Is it on, for example, the note in a box, solutions, the umbrellas, start nines, et \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Well, that's part of the feedback that we're getting. For example, can we set it up? Can you integrate with Umbro? Can you integrate with Start9? Can you integrate with RastyBlitz? can you make it simpler to set up? So, I think, a lot of that's done by t he FediMint team. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Because remember, FediMint is an OpusSource project versus a different OpusSource project. At some point in the future, it will be two different open source projects. However, we are using them as the bedrock, because if you want to custody significant a mounts of value We know that you want to go multisig. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Multisig for significant amounts of value is the best standard, and also you want privacy, so then privacy and multisig, that's FedEvent, basically. but, on the FedE side, we can do a lot as well. So we can provide, even though it's open source software, we can take it and provide it. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 again, it will be open source, but tools to help you build it really easily or put efforts to integrate with people like Umbrell and Start9. we've already had an integration with an organization called Clover, which we've been working on, and you're goin g to see more on that. But from our point of view, that's a lot of where the work is. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Also you want to connect this to the Lightning Network. And connected to the Lightning Network and maintaining a reliable connection is not easy. it can be complicated for people, especially managing liquidity. And now again, over time, I could get easie r, but right now it's not easy. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 There are organizations like, Breeze and others who make that easy. and you just saw an announcement from Erik, where they've already started, showing connectivity and support for LDK, which is this cross, LSP standard. So, again, we at Fedi can provide tools for FediMint, or people who are using FediMint, whether it's with Fedi or someone else, that make it really easy. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And again, our aim is one click, and you have a connection. You can set up your own lightning node that's set up in a relatively good way, so it'd be relatively reliable, but you don't have to manage it yourself. Or, you can connect to one of these LSP's and for a fee, they'll just handle all the light and management, but you're still in a trust minimized way. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So there's, but given all the feedback we're getting, it's not, this is completely wrong. You need to go back to the drawing board, it's all, okay, I get it, but you need to go further. You need to integrate with more. You need to make it easier. so that 's a good sign that we're on the right track. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf19\insrsid13517917 Knut:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Yeah. So, what about this date when you go open source? is that public or, when you have to go open source, it might be then or \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 in the, it's, it's, it's memorializing the business source license. In fact, we memorialized it. We actually have this memo memorializing when it happened. when we launched Freddy, we, we did this thing on the Bitcoin block. You can see it. We were estab lished on a certain block. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And we said Fedi is here. When we, quietly on May the 4th, we also put something that said Fedi colon and it was a hash. That hash is a hash of a memo. And the memo, which is on our, Fedi's got an open source, you can see the link and you can verify it. Showed that on May the 4th, the code became business source license. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 And by January the 3rd, 2026 or earlier, we must go, open source. And if we were to shut down or to stop development, we will instantly go open source. and so, so that, and we put it in block. I tried to find a core block. So it was block 8, 42069. It wa s actually was the block that was the core block as well. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 so yeah, it's, it's there. And, that's the date. We, we cannot go open source later than that. And we may very well go open source a lot earlier than that. \par }\pard\plain \ltrpar\s1\ql \li0\ri0\sb120\sa260\widctlpar\wrapdefault\aspalpha\aspnum\faauto\outlinelevel0\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \ab\af0\afs48\alang1025 \ltrch\fcs0 \b\fs48\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Wrapping Up \par }\pard\plain \ltrpar\s18\ql \li0\ri0\sa360\widctlpar\wrapdefault\aspalpha\aspnum\faauto\adjustright\rin0\lin0\itap0\pararsid13517917 \rtlch\fcs1 \af0\afs28\alang1025 \ltrch\fcs0 \fs28\lang1033\langfe1033\cgrid\langnp1033\langfenp1033 {\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Hey Obi, I think we could keep on grilling you on this and that little detail, but this has been really enlightening, fantastic to see how far this has come, even since our last conversation back in October, and yeah, just looking forward to everything y ou guys are doing, and I guess just as a last thing, people can now grab the Fedi app and Public federations are available to start to try \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 federations and there are, and you can set up your own federation There's a lot, I don't like to talk too much about what's coming in future because we just work on everything in order of customer demands. So if customer demand comes in, that changes the order, but we're working really hard to make it, It's already easy for if you're quite technical, but we're going to make it easier and easier to set up a federation, so keep looking out because that's a very common request to set up a federation yours elf, and we want to see what people do with it, create Fedi mods, create federations, use it, give us feedback, and we will continue to work on making an incredible, Open source interface portal to this freedom technology world. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Absolutely fantastic. We'll need to keep on having these conversations regularly, get updates because always fantastic to hear about this and good luck moving forward and I think we'll be trying some FETI stuff in our futures here. Lots of cool things ha ve come out of Nostriga and Baltic. Honey Badger by \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 I'm exciting to see that. And anywhere else you want to direct our listeners and viewers. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 So for Fedi, that's probably the best place because everything, that's a jumping off ground for everything else. And that's Fedi, F E D I dot X, Y, Z. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Fantastic. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 One of the cooler things that came out in Nostriga and Honeybadger was of course, yes, the inverse of clown world, our new book, and we want to give you one. if you're not given one during this weekend, you'll find it on bitcoininfinitystore. com. Thank you very much. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf20\insrsid13517917 Luke:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 and we need to sign it for you. Yeah, we'll do that offline. But Obi, thank you again. And this has been the Bitcoin Infinity Show. Thank you for listening. \par }{\rtlch\fcs1 \ab\af0 \ltrch\fcs0 \b\cf21\insrsid13517917 Obi:}{\rtlch\fcs1 \af0 \ltrch\fcs0 \insrsid13517917 Thanks. \par }{*\themedata 504b030414000600080000002100e9de0fbfff0000001c020000130000005b436f6e74656e745f54797065735d2e786d6cac91cb4ec3301045f748fc83e52d4a 9cb2400825e982c78ec7a27cc0c8992416c9d8b2a755fbf74cd25442a820166c2cd933f79e3be372bd1f07b5c3989ca74aaff2422b24eb1b475da5df374fd9ad 5689811a183c61a50f98f4babebc2837878049899a52a57be670674cb23d8e90721f90a4d2fa3802cb35762680fd800ecd7551dc18eb899138e3c943d7e503b6 b01d583deee5f99824e290b4ba3f364eac4a430883b3c092d4eca8f946c916422ecab927f52ea42b89a1cd59c254f919b0e85e6535d135a8de20f20b8c12c3b0 0c895fcf6720192de6bf3b9e89ecdbd6596cbcdd8eb28e7c365ecc4ec1ff1460f53fe813d3cc7f5b7f020000ffff0300504b030414000600080000002100a5d6 a7e7c0000000360100000b0000005f72656c732f2e72656c73848fcf6ac3300c87ef85bd83d17d51d2c31825762fa590432fa37d00e1287f68221bdb1bebdb4f c7060abb0884a4eff7a93dfeae8bf9e194e720169aaa06c3e2433fcb68e1763dbf7f82c985a4a725085b787086a37bdbb55fbc50d1a33ccd311ba548b6309512 0f88d94fbc52ae4264d1c910d24a45db3462247fa791715fd71f989e19e0364cd3f51652d73760ae8fa8c9ffb3c330cc9e4fc17faf2ce545046e37944c69e462 a1a82fe353bd90a865aad41ed0b5b8f9d6fd010000ffff0300504b0304140006000800000021006b799616830000008a0000001c0000007468656d652f746865 6d652f7468656d654d616e616765722e786d6c0ccc4d0ac3201040e17da17790d93763bb284562b2cbaebbf600439c1a41c7a0d29fdbd7e5e38337cedf14d59b 4b0d592c9c070d8a65cd2e88b7f07c2ca71ba8da481cc52c6ce1c715e6e97818c9b48d13df49c873517d23d59085adb5dd20d6b52bd521ef2cdd5eb9246a3d8b 4757e8d3f729e245eb2b260a0238fd010000ffff0300504b03041400060008000000210094a9528694070000c7200000160000007468656d652f7468656d652f 7468656d65312e786d6cec595f8b1bc9117f0fe43b0cf32e6b66248da4c5f2a1bfdeb3776d63c90ef7d82bb566dadb333d4cb7762d8e83e07bca4b207077e421 0779cb430839c8418ebce4c3186c92cb874875cf68d42db5bc7f30c184dd7dd1b47e55fd9baaeaaa52f5fdcf5e27d4b9c039272cedb9fe3dcf75703a670b9246 3df7c56c52ebb80e17285d20ca52dc73d798bb9f3df8e52feea32311e3043b209ff223d4736321b2a37a9dcf6119f17b2cc3297cb7647982043ce6517d91a34b d09bd07ae079613d4124759d1425a0f6e97249e6d8994995ee838df23185c75470b930a7f954aac68684c22ece7d89e06b3ea4b9738168cf857d16ec72865f0b d7a1880bf8a2e77aeacfad3fb85f4747a51015076435b989fa2be54a81c579a0f6cca3b36a536f1c749a7ea55f01a8d8c78d3bf2bfd2a700683e87372db8e83a fd56e8758212ab818a8f16ddddb6df30f19afec61e67bf1b0e82a6a15f810afdcd3dbc37e98e472d03af4005beb587ef7bc1a0db30f00a54e0c33d7c73dc6f07 6303af403125e9f93e3a6c773a6189ae204b468fadf06e187aed5109dfa2201aaae8925b2c592a0ec55a825eb17c020009a44890d411eb0c2fd11ca2b89f09c6 9d11e119456bd7c950ca382c7b81ef43e835bda0fa571647471869d2921730e17b4b928fc3e739c944cf7d045a5d0df2eea79fdebef9f1ed9bbfbffdfaebb76f feea9c902816852a43ee18a5912ef7f39f7ef79fef7fedfcfb6f7ffcf99b6fed78aee3dfffe537effff1cf0fa987a3b635c5bbef7e78ffe30fef7effdb7ffdf9 1b8bf67e8ece74f88c24983b4ff0a5f39c25f082ca14267f7c96df4c621623a24bf4d388a314c95d2cfac72236d04fd688220b6e804d3bbecc21d5d8800f57af 0cc2d3385f0962d1f8384e0ce0296374c072ab151ecbbd3433cf566964df3c5fe9b8e7085dd8f61ea2d4f0f27895418e253695c3181b349f51940a14e1140b47 7ec7ce31b6bcdd178418763d25f39c71b614ce17c419206235c98c9c19d1b4153a2609f8656d2308fe366c73fad219306a7beb11be3091703610b5909f616a98 f1215a0994d854ce504275839f2011db484ed7f95cc78db9004f47983267bcc09cdb649ee6f0be9ad31f23c86e56b79fd27562227341ce6d3a4f10633a72c4ce 87314a321b764ad258c77ececf214491f38c091bfc949927443e831f507ad0dd2f0936dc7d75367801594ea7b40d10f9cd2ab7f8f2216646fc4ed77489b02dd5 f4f3c448b1fd9c58a363b08a8cd03ec198a24bb4c0d879f1b985c1806586cdb7a41fc590558eb12db01e213356e5738a39f44ab2b9d9cf9327841b213bc5113b c0e774bd9378d6284d507e48f313f0ba6ef3f1590e87d142e1299d9febc027047a408817ab519e72d0a105f741adcf62641430f9ccedf1bace0dff5de78cc1b9 7c65d0b8c6b904197c631948ecbacc076d3343d4d8601b3033449c135bba0511c3fd5b11595c95d8ca2ab7340fedd60dd01d194d4f42d22b3aa0ff5de703fdc5 bb3f7c6f09c18fd3edd8151ba9ea867dcea15472bcd3dd1cc2edf63443962fc8a7dfd28cd02a7d86a18aece7abbb8ee6aea371ffef3b9a43e7f9ae8f39d46ddc f5312ef417777d4c395af9387dccb67581ae468e178a318f1afa2407673e4b42e954ac293ee16aecc3e1d7cc62028b524ecd3b713503cc62f828cb1c6c60e0a2 1c29192767e25744c4d31865301bf25da924e2a5ea883b19e3303252cb56dd124f57c9295b14a34e355bf28acaca91d8ae7b2d183a15eb30a612053a6c978b92 9f9aa7025fc5365263d60d01297b1312da6626898685447bb37805093935fb382cba16161da97ee3aa3d5300b5ca2bf073db811fe93db7d594846046cee7d09a 2fa49f0a576fbcab9cf9313d7dc8984604c058b1781318ca579eee4aae075f4fbe5d116ad7f0b4414239a5082b9384b28c6af0780c3f82cbe894abd7a171535f 77b72e35e84953a8fd20beb734da9d0fb1b8adaf416e3737d054cf1434752e7b6ed86841c8cc51d673973032868f4906b1c3e52f2e4423b877998bbc38f0b7c9 2c59cec508f1b830b84a3a857b122270ee5092f45cf9fa951b68aa7288e2e60790103e59725d482b9f1a3970bae964bc5ce2b9d0ddaead484b178f90e18b5c61 fd5689df1e2c25d90adc3d8d1797ce195de5cf118458abed4b032e08879b03bfb0e682c0555895c8b6f1b75398cae4afdf45a9182ad611cd625456143d991770 554f2a3aeaa9b281f654be33185433495908cf22596075a31ad5b42a5d05878355f76a2169392d696e6ba6915564d5b4673163874d19d8b1e5ed8abcc66a6362 c8697a852f52f76ecaed6e72dd4e9f505509307865bfdb957e8dda7633839a64bc9f8665ce2e57cddab179c12ba85da74868593fdca8ddb15b5523acdbc1e2ad 2a3fc8ed462d2c2d377da5b2b4ba33d7afb5d9d92b481e23e872575470e54a98ebe608bab2a9ea498ab40147e4b5288f067c725639e9b95f7aad7e7318b48635 afd31ad79a8da657ebb4fa8d5abfd56af8e396ef8d06c1575058449cf8ade2be7e02d717745ddedaabf5bd9bfb647343736fce923a5337f375455cdddcfbc1e1 9b7b8740d2f93218fbcda01f0c6bc3911fd69ac128ac75da8d7e6d1884a3a00f293d9cf4bf729d0b05f607a3d164d20a6ae110704dafdfaaf5078d612dec8c07 c1c41f37471e80cbccf91afa6fb0e9c616f051f17af05f000000ffff0300504b0304140006000800000021000dd1909fb60000001b010000270000007468656d 652f7468656d652f5f72656c732f7468656d654d616e616765722e786d6c2e72656c73848f4d0ac2301484f78277086f6fd3ba109126dd88d0add40384e4350d 363f2451eced0dae2c082e8761be9969bb979dc9136332de3168aa1a083ae995719ac16db8ec8e4052164e89d93b64b060828e6f37ed1567914b284d26245228 2e3198720e274a939cd08a54f980ae38a38f56e422a3a641c8bbd048f7757da0f19b017cc524bd62107bd5001996509affb3fd381a89672f1f165dfe514173d9 850528a2c6cce0239baa4c04ca5bbabac4df000000ffff0300504b01022d0014000600080000002100e9de0fbfff0000001c0200001300000000000000000000 000000000000005b436f6e74656e745f54797065735d2e786d6c504b01022d0014000600080000002100a5d6a7e7c0000000360100000b000000000000000000 00000000300100005f72656c732f2e72656c73504b01022d00140006000800000021006b799616830000008a0000001c00000000000000000000000000190200 007468656d652f7468656d652f7468656d654d616e616765722e786d6c504b01022d001400060008000000210094a9528694070000c720000016000000000000 00000000000000d60200007468656d652f7468656d652f7468656d65312e786d6c504b01022d00140006000800000021000dd1909fb60000001b010000270000 00000000000000000000009e0a00007468656d652f7468656d652f5f72656c732f7468656d654d616e616765722e786d6c2e72656c73504b050600000000050005005d010000990b00000000} {*\colorschememapping 3c3f786d6c2076657273696f6e3d22312e302220656e636f64696e673d225554462d3822207374616e64616c6f6e653d22796573223f3e0d0a3c613a636c724d 617020786d6c6e733a613d22687474703a2f2f736368656d61732e6f70656e786d6c666f726d6174732e6f72672f64726177696e676d6c2f323030362f6d6169 6e22206267313d226c743122207478313d22646b3122206267323d226c743222207478323d22646b322220616363656e74313d22616363656e74312220616363 656e74323d22616363656e74322220616363656e74333d22616363656e74332220616363656e74343d22616363656e74342220616363656e74353d22616363656e74352220616363656e74363d22616363656e74362220686c696e6b3d22686c696e6b2220666f6c486c696e6b3d22666f6c486c696e6b222f3e} {*\latentstyles\lsdstimax376\lsdlockeddef0\lsdsemihiddendef0\lsdunhideuseddef0\lsdqformatdef0\lsdprioritydef99{\lsdlockedexcept \lsdqformat1 \lsdpriority0 \lsdlocked0 Normal;\lsdqformat1 \lsdpriority9 \lsdlocked0 heading 1; \lsdsemihidden1 \lsdunhideused1 \lsdqformat1 \lsdpriority9 \lsdlocked0 heading 2;\lsdsemihidden1 \lsdunhideused1 \lsdqformat1 \lsdpriority9 \lsdlocked0 heading 3;\lsdsemihidden1 \lsdunhideused1 \lsdqformat1 \lsdpriority9 \lsdlocked0 heading 4; \lsdsemihidden1 \lsdunhideused1 \lsdqformat1 \lsdpriority9 \lsdlocked0 heading 5;\lsdsemihidden1 \lsdunhideused1 \lsdqformat1 \lsdpriority9 \lsdlocked0 heading 6;\lsdsemihidden1 \lsdunhideused1 \lsdqformat1 \lsdpriority9 \lsdlocked0 heading 7; \lsdsemihidden1 \lsdunhideused1 \lsdqformat1 \lsdpriority9 \lsdlocked0 heading 8;\lsdsemihidden1 \lsdunhideused1 \lsdqformat1 \lsdpriority9 \lsdlocked0 heading 9;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 index 1; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 index 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 index 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 index 4;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 index 5; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 index 6;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 index 7;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 index 8;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 index 9; \lsdsemihidden1 \lsdunhideused1 \lsdpriority39 \lsdlocked0 toc 1;\lsdsemihidden1 \lsdunhideused1 \lsdpriority39 \lsdlocked0 toc 2;\lsdsemihidden1 \lsdunhideused1 \lsdpriority39 \lsdlocked0 toc 3; \lsdsemihidden1 \lsdunhideused1 \lsdpriority39 \lsdlocked0 toc 4;\lsdsemihidden1 \lsdunhideused1 \lsdpriority39 \lsdlocked0 toc 5;\lsdsemihidden1 \lsdunhideused1 \lsdpriority39 \lsdlocked0 toc 6; \lsdsemihidden1 \lsdunhideused1 \lsdpriority39 \lsdlocked0 toc 7;\lsdsemihidden1 \lsdunhideused1 \lsdpriority39 \lsdlocked0 toc 8;\lsdsemihidden1 \lsdunhideused1 \lsdpriority39 \lsdlocked0 toc 9;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Normal Indent; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 footnote text;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 annotation text;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 header;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 footer; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 index heading;\lsdsemihidden1 \lsdunhideused1 \lsdqformat1 \lsdpriority35 \lsdlocked0 caption;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 table of figures; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 envelope address;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 envelope return;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 footnote reference;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 annotation reference; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 line number;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 page number;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 endnote reference;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 endnote text; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 table of authorities;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 macro;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 toa heading;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Bullet;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Number;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List 3; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List 4;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List 5;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Bullet 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Bullet 3; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Bullet 4;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Bullet 5;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Number 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Number 3; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Number 4;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Number 5;\lsdqformat1 \lsdpriority10 \lsdlocked0 Title;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Closing; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Signature;\lsdsemihidden1 \lsdunhideused1 \lsdpriority1 \lsdlocked0 Default Paragraph Font;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Body Text;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Body Text Indent; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Continue;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Continue 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Continue 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Continue 4; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 List Continue 5;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Message Header;\lsdqformat1 \lsdpriority11 \lsdlocked0 Subtitle;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Salutation; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Date;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Body Text First Indent;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Body Text First Indent 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Note Heading; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Body Text 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Body Text 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Body Text Indent 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Body Text Indent 3; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Block Text;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Hyperlink;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 FollowedHyperlink;\lsdqformat1 \lsdpriority22 \lsdlocked0 Strong; \lsdqformat1 \lsdpriority20 \lsdlocked0 Emphasis;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Document Map;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Plain Text;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 E-mail Signature; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Top of Form;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Bottom of Form;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Normal (Web);\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Acronym; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Address;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Cite;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Code;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Definition; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Keyboard;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Preformatted;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Sample;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Typewriter; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 HTML Variable;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Normal Table;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 annotation subject;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 No List; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Outline List 1;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Outline List 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Outline List 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Simple 1; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Simple 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Simple 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Classic 1;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Classic 2; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Classic 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Classic 4;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Colorful 1;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Colorful 2; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Colorful 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Columns 1;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Columns 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Columns 3; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Columns 4;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Columns 5;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Grid 1;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Grid 2; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Grid 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Grid 4;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Grid 5;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Grid 6; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Grid 7;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Grid 8;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table List 1;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table List 2; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table List 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table List 4;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table List 5;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table List 6; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table List 7;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table List 8;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table 3D effects 1;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table 3D effects 2; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table 3D effects 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Contemporary;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Elegant;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Professional; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Subtle 1;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Subtle 2;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Web 1;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Web 2; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Web 3;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Balloon Text;\lsdpriority39 \lsdlocked0 Table Grid;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Table Theme;\lsdsemihidden1 \lsdlocked0 Placeholder Text; \lsdqformat1 \lsdpriority1 \lsdlocked0 No Spacing;\lsdpriority60 \lsdlocked0 Light Shading;\lsdpriority61 \lsdlocked0 Light List;\lsdpriority62 \lsdlocked0 Light Grid;\lsdpriority63 \lsdlocked0 Medium Shading 1;\lsdpriority64 \lsdlocked0 Medium Shading 2; \lsdpriority65 \lsdlocked0 Medium List 1;\lsdpriority66 \lsdlocked0 Medium List 2;\lsdpriority67 \lsdlocked0 Medium Grid 1;\lsdpriority68 \lsdlocked0 Medium Grid 2;\lsdpriority69 \lsdlocked0 Medium Grid 3;\lsdpriority70 \lsdlocked0 Dark List; \lsdpriority71 \lsdlocked0 Colorful Shading;\lsdpriority72 \lsdlocked0 Colorful List;\lsdpriority73 \lsdlocked0 Colorful Grid;\lsdpriority60 \lsdlocked0 Light Shading Accent 1;\lsdpriority61 \lsdlocked0 Light List Accent 1; \lsdpriority62 \lsdlocked0 Light Grid Accent 1;\lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 1;\lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 1;\lsdpriority65 \lsdlocked0 Medium List 1 Accent 1;\lsdsemihidden1 \lsdlocked0 Revision; \lsdqformat1 \lsdpriority34 \lsdlocked0 List Paragraph;\lsdqformat1 \lsdpriority29 \lsdlocked0 Quote;\lsdqformat1 \lsdpriority30 \lsdlocked0 Intense Quote;\lsdpriority66 \lsdlocked0 Medium List 2 Accent 1;\lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 1; \lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 1;\lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 1;\lsdpriority70 \lsdlocked0 Dark List Accent 1;\lsdpriority71 \lsdlocked0 Colorful Shading Accent 1;\lsdpriority72 \lsdlocked0 Colorful List Accent 1; \lsdpriority73 \lsdlocked0 Colorful Grid Accent 1;\lsdpriority60 \lsdlocked0 Light Shading Accent 2;\lsdpriority61 \lsdlocked0 Light List Accent 2;\lsdpriority62 \lsdlocked0 Light Grid Accent 2;\lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 2; \lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 2;\lsdpriority65 \lsdlocked0 Medium List 1 Accent 2;\lsdpriority66 \lsdlocked0 Medium List 2 Accent 2;\lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 2;\lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 2; \lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 2;\lsdpriority70 \lsdlocked0 Dark List Accent 2;\lsdpriority71 \lsdlocked0 Colorful Shading Accent 2;\lsdpriority72 \lsdlocked0 Colorful List Accent 2;\lsdpriority73 \lsdlocked0 Colorful Grid Accent 2; \lsdpriority60 \lsdlocked0 Light Shading Accent 3;\lsdpriority61 \lsdlocked0 Light List Accent 3;\lsdpriority62 \lsdlocked0 Light Grid Accent 3;\lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 3;\lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 3; \lsdpriority65 \lsdlocked0 Medium List 1 Accent 3;\lsdpriority66 \lsdlocked0 Medium List 2 Accent 3;\lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 3;\lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 3;\lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 3; \lsdpriority70 \lsdlocked0 Dark List Accent 3;\lsdpriority71 \lsdlocked0 Colorful Shading Accent 3;\lsdpriority72 \lsdlocked0 Colorful List Accent 3;\lsdpriority73 \lsdlocked0 Colorful Grid Accent 3;\lsdpriority60 \lsdlocked0 Light Shading Accent 4; \lsdpriority61 \lsdlocked0 Light List Accent 4;\lsdpriority62 \lsdlocked0 Light Grid Accent 4;\lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 4;\lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 4;\lsdpriority65 \lsdlocked0 Medium List 1 Accent 4; \lsdpriority66 \lsdlocked0 Medium List 2 Accent 4;\lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 4;\lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 4;\lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 4;\lsdpriority70 \lsdlocked0 Dark List Accent 4; \lsdpriority71 \lsdlocked0 Colorful Shading Accent 4;\lsdpriority72 \lsdlocked0 Colorful List Accent 4;\lsdpriority73 \lsdlocked0 Colorful Grid Accent 4;\lsdpriority60 \lsdlocked0 Light Shading Accent 5;\lsdpriority61 \lsdlocked0 Light List Accent 5; \lsdpriority62 \lsdlocked0 Light Grid Accent 5;\lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 5;\lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 5;\lsdpriority65 \lsdlocked0 Medium List 1 Accent 5;\lsdpriority66 \lsdlocked0 Medium List 2 Accent 5; \lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 5;\lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 5;\lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 5;\lsdpriority70 \lsdlocked0 Dark List Accent 5;\lsdpriority71 \lsdlocked0 Colorful Shading Accent 5; \lsdpriority72 \lsdlocked0 Colorful List Accent 5;\lsdpriority73 \lsdlocked0 Colorful Grid Accent 5;\lsdpriority60 \lsdlocked0 Light Shading Accent 6;\lsdpriority61 \lsdlocked0 Light List Accent 6;\lsdpriority62 \lsdlocked0 Light Grid Accent 6; \lsdpriority63 \lsdlocked0 Medium Shading 1 Accent 6;\lsdpriority64 \lsdlocked0 Medium Shading 2 Accent 6;\lsdpriority65 \lsdlocked0 Medium List 1 Accent 6;\lsdpriority66 \lsdlocked0 Medium List 2 Accent 6; \lsdpriority67 \lsdlocked0 Medium Grid 1 Accent 6;\lsdpriority68 \lsdlocked0 Medium Grid 2 Accent 6;\lsdpriority69 \lsdlocked0 Medium Grid 3 Accent 6;\lsdpriority70 \lsdlocked0 Dark List Accent 6;\lsdpriority71 \lsdlocked0 Colorful Shading Accent 6; \lsdpriority72 \lsdlocked0 Colorful List Accent 6;\lsdpriority73 \lsdlocked0 Colorful Grid Accent 6;\lsdqformat1 \lsdpriority19 \lsdlocked0 Subtle Emphasis;\lsdqformat1 \lsdpriority21 \lsdlocked0 Intense Emphasis; \lsdqformat1 \lsdpriority31 \lsdlocked0 Subtle Reference;\lsdqformat1 \lsdpriority32 \lsdlocked0 Intense Reference;\lsdqformat1 \lsdpriority33 \lsdlocked0 Book Title;\lsdsemihidden1 \lsdunhideused1 \lsdpriority37 \lsdlocked0 Bibliography; \lsdsemihidden1 \lsdunhideused1 \lsdqformat1 \lsdpriority39 \lsdlocked0 TOC Heading;\lsdpriority41 \lsdlocked0 Plain Table 1;\lsdpriority42 \lsdlocked0 Plain Table 2;\lsdpriority43 \lsdlocked0 Plain Table 3;\lsdpriority44 \lsdlocked0 Plain Table 4; \lsdpriority45 \lsdlocked0 Plain Table 5;\lsdpriority40 \lsdlocked0 Grid Table Light;\lsdpriority46 \lsdlocked0 Grid Table 1 Light;\lsdpriority47 \lsdlocked0 Grid Table 2;\lsdpriority48 \lsdlocked0 Grid Table 3;\lsdpriority49 \lsdlocked0 Grid Table 4; \lsdpriority50 \lsdlocked0 Grid Table 5 Dark;\lsdpriority51 \lsdlocked0 Grid Table 6 Colorful;\lsdpriority52 \lsdlocked0 Grid Table 7 Colorful;\lsdpriority46 \lsdlocked0 Grid Table 1 Light Accent 1;\lsdpriority47 \lsdlocked0 Grid Table 2 Accent 1; \lsdpriority48 \lsdlocked0 Grid Table 3 Accent 1;\lsdpriority49 \lsdlocked0 Grid Table 4 Accent 1;\lsdpriority50 \lsdlocked0 Grid Table 5 Dark Accent 1;\lsdpriority51 \lsdlocked0 Grid Table 6 Colorful Accent 1; \lsdpriority52 \lsdlocked0 Grid Table 7 Colorful Accent 1;\lsdpriority46 \lsdlocked0 Grid Table 1 Light Accent 2;\lsdpriority47 \lsdlocked0 Grid Table 2 Accent 2;\lsdpriority48 \lsdlocked0 Grid Table 3 Accent 2; \lsdpriority49 \lsdlocked0 Grid Table 4 Accent 2;\lsdpriority50 \lsdlocked0 Grid Table 5 Dark Accent 2;\lsdpriority51 \lsdlocked0 Grid Table 6 Colorful Accent 2;\lsdpriority52 \lsdlocked0 Grid Table 7 Colorful Accent 2; \lsdpriority46 \lsdlocked0 Grid Table 1 Light Accent 3;\lsdpriority47 \lsdlocked0 Grid Table 2 Accent 3;\lsdpriority48 \lsdlocked0 Grid Table 3 Accent 3;\lsdpriority49 \lsdlocked0 Grid Table 4 Accent 3; \lsdpriority50 \lsdlocked0 Grid Table 5 Dark Accent 3;\lsdpriority51 \lsdlocked0 Grid Table 6 Colorful Accent 3;\lsdpriority52 \lsdlocked0 Grid Table 7 Colorful Accent 3;\lsdpriority46 \lsdlocked0 Grid Table 1 Light Accent 4; \lsdpriority47 \lsdlocked0 Grid Table 2 Accent 4;\lsdpriority48 \lsdlocked0 Grid Table 3 Accent 4;\lsdpriority49 \lsdlocked0 Grid Table 4 Accent 4;\lsdpriority50 \lsdlocked0 Grid Table 5 Dark Accent 4; \lsdpriority51 \lsdlocked0 Grid Table 6 Colorful Accent 4;\lsdpriority52 \lsdlocked0 Grid Table 7 Colorful Accent 4;\lsdpriority46 \lsdlocked0 Grid Table 1 Light Accent 5;\lsdpriority47 \lsdlocked0 Grid Table 2 Accent 5; \lsdpriority48 \lsdlocked0 Grid Table 3 Accent 5;\lsdpriority49 \lsdlocked0 Grid Table 4 Accent 5;\lsdpriority50 \lsdlocked0 Grid Table 5 Dark Accent 5;\lsdpriority51 \lsdlocked0 Grid Table 6 Colorful Accent 5; \lsdpriority52 \lsdlocked0 Grid Table 7 Colorful Accent 5;\lsdpriority46 \lsdlocked0 Grid Table 1 Light Accent 6;\lsdpriority47 \lsdlocked0 Grid Table 2 Accent 6;\lsdpriority48 \lsdlocked0 Grid Table 3 Accent 6; \lsdpriority49 \lsdlocked0 Grid Table 4 Accent 6;\lsdpriority50 \lsdlocked0 Grid Table 5 Dark Accent 6;\lsdpriority51 \lsdlocked0 Grid Table 6 Colorful Accent 6;\lsdpriority52 \lsdlocked0 Grid Table 7 Colorful Accent 6; \lsdpriority46 \lsdlocked0 List Table 1 Light;\lsdpriority47 \lsdlocked0 List Table 2;\lsdpriority48 \lsdlocked0 List Table 3;\lsdpriority49 \lsdlocked0 List Table 4;\lsdpriority50 \lsdlocked0 List Table 5 Dark; \lsdpriority51 \lsdlocked0 List Table 6 Colorful;\lsdpriority52 \lsdlocked0 List Table 7 Colorful;\lsdpriority46 \lsdlocked0 List Table 1 Light Accent 1;\lsdpriority47 \lsdlocked0 List Table 2 Accent 1;\lsdpriority48 \lsdlocked0 List Table 3 Accent 1; \lsdpriority49 \lsdlocked0 List Table 4 Accent 1;\lsdpriority50 \lsdlocked0 List Table 5 Dark Accent 1;\lsdpriority51 \lsdlocked0 List Table 6 Colorful Accent 1;\lsdpriority52 \lsdlocked0 List Table 7 Colorful Accent 1; \lsdpriority46 \lsdlocked0 List Table 1 Light Accent 2;\lsdpriority47 \lsdlocked0 List Table 2 Accent 2;\lsdpriority48 \lsdlocked0 List Table 3 Accent 2;\lsdpriority49 \lsdlocked0 List Table 4 Accent 2; \lsdpriority50 \lsdlocked0 List Table 5 Dark Accent 2;\lsdpriority51 \lsdlocked0 List Table 6 Colorful Accent 2;\lsdpriority52 \lsdlocked0 List Table 7 Colorful Accent 2;\lsdpriority46 \lsdlocked0 List Table 1 Light Accent 3; \lsdpriority47 \lsdlocked0 List Table 2 Accent 3;\lsdpriority48 \lsdlocked0 List Table 3 Accent 3;\lsdpriority49 \lsdlocked0 List Table 4 Accent 3;\lsdpriority50 \lsdlocked0 List Table 5 Dark Accent 3; \lsdpriority51 \lsdlocked0 List Table 6 Colorful Accent 3;\lsdpriority52 \lsdlocked0 List Table 7 Colorful Accent 3;\lsdpriority46 \lsdlocked0 List Table 1 Light Accent 4;\lsdpriority47 \lsdlocked0 List Table 2 Accent 4; \lsdpriority48 \lsdlocked0 List Table 3 Accent 4;\lsdpriority49 \lsdlocked0 List Table 4 Accent 4;\lsdpriority50 \lsdlocked0 List Table 5 Dark Accent 4;\lsdpriority51 \lsdlocked0 List Table 6 Colorful Accent 4; \lsdpriority52 \lsdlocked0 List Table 7 Colorful Accent 4;\lsdpriority46 \lsdlocked0 List Table 1 Light Accent 5;\lsdpriority47 \lsdlocked0 List Table 2 Accent 5;\lsdpriority48 \lsdlocked0 List Table 3 Accent 5; \lsdpriority49 \lsdlocked0 List Table 4 Accent 5;\lsdpriority50 \lsdlocked0 List Table 5 Dark Accent 5;\lsdpriority51 \lsdlocked0 List Table 6 Colorful Accent 5;\lsdpriority52 \lsdlocked0 List Table 7 Colorful Accent 5; \lsdpriority46 \lsdlocked0 List Table 1 Light Accent 6;\lsdpriority47 \lsdlocked0 List Table 2 Accent 6;\lsdpriority48 \lsdlocked0 List Table 3 Accent 6;\lsdpriority49 \lsdlocked0 List Table 4 Accent 6; \lsdpriority50 \lsdlocked0 List Table 5 Dark Accent 6;\lsdpriority51 \lsdlocked0 List Table 6 Colorful Accent 6;\lsdpriority52 \lsdlocked0 List Table 7 Colorful Accent 6;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Mention; \lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Smart Hyperlink;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Hashtag;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Unresolved Mention;\lsdsemihidden1 \lsdunhideused1 \lsdlocked0 Smart Link;}}{*\datastore 01050000 02000000180000004d73786d6c322e534158584d4c5265616465722e362e3000000000000000000000060000 d0cf11e0a1b11ae1000000000000000000000000000000003e000300feff090006000000000000000000000001000000010000000000000000100000feffffff00000000feffffff0000000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff fffffffffffffffffdfffffffeffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff ffffffffffffffffffffffffffffffff52006f006f007400200045006e00740072007900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000016000500ffffffffffffffffffffffff0c6ad98892f1d411a65f0040963251e500000000000000000000000040b2 e529fd1edb01feffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff00000000000000000000000000000000000000000000000000000000 00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff0000000000000000000000000000000000000000000000000000 000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffffffffffffffffffff000000000000000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000105000000000000}}BIS130 - Transcript Knut: Welcome to the Bitcoin Infinity Show, brought to you by BitBox Stampseed, the Bitcoin Advisor and ShopInBit. Enjoy the conversation. Welcoming Obi Nwosu Luke: Obi, welcome for the first time to the Bitcoin Infinity Show. Obi: well, Knut: We rebranded. Obi: what is time in infinity? No, no, it's the second time, great to have you back. yeah, we have, it's been a wild ride and the journey is just beginning. So yeah, thank you. The Launch of Fedi
Knut: so Fedimin launched, two weeks ago. Is it the Fedi Obi: Fedi, launched? Knut: launched? Yeah. These terms. Obi: no, no, Fedi Mint launched, effectively Fedi Mint launched nearly five years ago. FediMint is a very old technology, very, you know, the first, the first FediMint transaction, where someone used FediMint e cash over Lightning to buy a cup of coffee, which was after, you know, a year plus of development was on, I believe it was the 3rd of the 8th, 3rd of August, 2021. Obi: And so we're trying to, like you have a Bitcoin Infinity Day, we're suggesting, that was actually Erik, my, the inventor of Fedi Mint. from Parinelli Police, just actually, and so I like to think of that as e cash coffee day. Cause actually it was like, you actually bought the cup of coffee with e cash. Obi: so yeah, but yeah, Fedi finally launched two weeks ago. Knut: All right. so I think, for those who haven't seen the previous episode with you, if they want to know more about you, we should probably go back to that episode, but I think you're going to have to do the TLDR on what Fedi is for our listeners. Like that's a good start, I think. Obi: So yeah, and now we can be clear about what Fedi is. And so Fedi, is two things still. Even Fedi is two things. One is the company called Fedi and the other is this product called Fedi. So if we talk about the product that people have on their phone, Fedi is a community super app. And so it's an app that takes the best of freedom technology. Obi: it's got Bitcoin functionality in it, Lightning connectivity, obviously FediMint for handling community custody. but it's also got Nostr support and any other freedom technology that's out there that's mature and reliable. We've taken the time to integrate into one simple to use app. So it allows you to have chat. Obi: We use Matrix as this federated, decentralized, encrypted chat protocol. It has money with the combination of Lightning, Bitcoin, and Fediment and more. So it has a built in web browser inside it. And therefore you can access all of the Bitcoin ecosystem of apps from Bitrefill to Unleash. chat to BTCmaps and beyond. Obi: All in one place. So you don't have to have this smorgasbord of different apps and tabs open one app to use them all. And the app itself, we announced as well, is now source available and will eventually be open source as well. So we're trying to make the best of it. portal into the freedom technology space. Obi: So that's Fedi. And then Fedi the company builds the Fedi app. And we also have something we call the FedEye Order, which is, this selection of incredible people, FedEye Knights, who are on the ground and they, you can think of them as like a Decentralized genius bar. If you've got an iPhone, you have the genius bar that goes along with the phone. Obi: The reason why the iPhone is so amazing is not just the phone, but it's also the incredible support you can get. If you can go to an Apple store and you go to the genius bar, they can help you. we have that instead of it being in, you know, Fifth Avenue or Oxford street in London or so on. Obi: It's in, the capital of Togo or Uganda or. Guatemala, or so on. On the ground, they will locate communities, they will educate communities. and they will support communities on Bitcoin, on Lightning, on FediMent, on all of these different websites and services that are out there to provide that sort of support that's needed for the communities that are outside of the existing Bitcoin space. How Federations Work Knut: Okay, great. so how does a federation work? Obi: so the first thing you have to do, wherever you custody is where you transact and do and you live and so on, which is why. Banks try very much when you're young to get you to hold a bank account with them because they know that most people never leave and then all other services are provided. So how do you actually custody? Obi: For many people they've had two choices. Either they do everything themselves and that's the best if you can do it just like it's the best to be able to build and fix your own car or house but not everybody can do that but that is always the best because no one's going to love you. And put as much care in as yourself. Obi: The other extreme is to fully outsource it, fully give it to some private party, which is actually what ends up 95 percent plus people doing, and that's putting their money on a Coinbase or some other centralized service. and the same with communication. They would use some sort of centralized service. Obi: They would use a WhatsApp, an X. com, a Telegram, a WeChat or so on. They would use some centralized chat. And if you think about it. Our lives are communication and money and value. So both those things, most people outsource, some people take it in house. If I want to set up a federation, which is to do with the custody of the money, where FedeMint is this middle, middle house, I can find within my community, a number of trusted parties. Obi: We call them guardians. So let's say. You found us three plus, you know, your great t shirt, Greg Voss. The minimum we suggest is four for various Esoteric reasons From a cryptographic security point of view we suggest four, but you can have seven You can have you can keep growing you could have we've seen people have seen Federation stood up with as many as 40 people in them And it will get slower and slower if it gets beyond that, but, but technically you can. Obi: It'll be this, it'll create this huge multisig, i. e. multiple people have to sign before you do a transaction on chain. And so multisig starts to get expensive of a certain size. But let's say us three plus Greg. We would FedeMint software. we would download the 30 minute software onto a machine that we have spare, and we would set up and run it. Obi: The setup process will, part of it will enter the information about the other three. And we make that very simple, it's a web interface, you point and click and you get a code and you share that code with the other parties, everybody shares the code of each other. Maybe you go into a group chat and paste each other's code. Obi: Everybody copies each other's, enters it into our own FediMint and then they connect to each other and they form a federation. As long as you keep that box, running, connected to the internet, and connected to electricity, the federation, for each, all the four, the federation are one. Obi: But because it's a federation, if one of them, for example, had a power cut, or lost their internet, or had to change their domain name, or something like that, The other three will be able to continue and operate. Yep, so you've now created this community custody platform. Now, anyone with the FEDI app or any other app that supports the FEDIMINT protocol, Webimint, and we're hoping that many others will set up FEDIMINT wallets, like there are multiple Lightning wallets in future. Obi: Any FDI min wallet compatible wallets like Fedie, can connect to your federation At the end of setting up the fed min server will show a QR code and the string that represents how to connect to your Federation. So you could take your Fed app, or the Mutiny wallet, or Web Mint, or any other, fed mint compatible wallet, and you'll scan that QR code. Obi: And you've now connected to that federation and that federation becomes, you can now use it to custody. Now, what will happen is, if for example, someone wants to send money to you, you would, just as if you're using a Bitcoin wallet, let's say it's on chain. you would say, I want to receive, enter the amount and it'll show a QR code. Obi: Someone else who's using a normal Bitcoin wallet will scan that code and send over the Bitcoin main chain money to you. But what's actually happening is your Fediap is communicating with the Federation. Your Federation is creating a Bitcoin address for you to send to and sends it back to you for you to display. Obi: Okay. And then a user, someone else who's using a completely different wallet will send money to that address. Actually goes to the federation and they, the four of us combined will process that and create e cash, which is like a token representation of the Obi: Bitcoin. And then the e cash will be sent to you. But the way it, the way it's sent is completely privacy preserving. So the guardians have no way of knowing who they are providing that service for, who's receiving the money. Obi: There's full privacy. Obi: All right, and neither does the sender, I assume, like the sender doesn't, that they sent Bitcoin to us and address. They have no idea who, so if there are, let's say we set this up and we're using it for our friends and extended family and in total, there are 40 of us or 50 of us Obi: When you send to that address, there's no way to know out of those 40 or 50 people who received it or who requested it. Knut: All right, so, a bit about the guardians and the multisig, that's obviously because you don't want to have a single point of attack for each, federation, right? Obi: point of failure, Knut: A single point of Obi: the more likely thing is that someone's machine, if you had one machine, the most likely thing that will happen, almost guaranteed, at some point you'll have some sort of power cut or internet cut. Internet cut is probably the most likely you'll, you'll have a glitch on your internet for 30 minutes. Obi: If you do, Everyone using your federation won't be able to use your system for 30 minutes. Knut: but it's also an attack vector. Like if the, if the, if there's a lot of money in the federation and, so there's, there's an incentive to attack the guardians. Like, can you be completely sure that the guardians don't know each other's identities and stuff like that? Like how, I know you think a lot about the attack vector. Knut: So I'm like, can you go into that a bit? Obi: can't be completely sure of anything in life. So the answer to that is automatically no. Can you be completely sure of something? but, it depends on the Also, there's an assumption that you have, that the people don't know each other. Cause I think very often in, there's two types of scenarios. Obi: It could be that each party completely doesn't know each other, or the more common scenario will be that you're some community or some group of friends. And within you, you've decided. Of the people who are my friends and family and so on, these four people are the ones who are consistently the most reliable, the most trusted and so on. Obi: They do know each other, and you know who they are, and it's because you know who they are that you're comfortable with them holding. they're the Uncle Jims of the family. they're known to be reliable. They're known to be people who care about their friends and family. Obi: that's very often actually what we're seeing is the more common scenario than the ones where people are completely, anonymous to each other. But as it matures, we may see the other scenario happen as well. The Uncle Network Luke: It's a literal uncle network. I know Uncle Rockstar started the uncle network here on infinity day. Yeah, you got the brother Luke, and so that's four, so we're Obi: are you an uncle? Knut: am an uncle officially now. Knut: an uncle as well, are like, but dubbed by Uncle Rockstar Obi: I haven't been dubbed I, so Obi: you are a good candidate. candidate, but I am biologically now, an Knut: oh, congratulations, Obi: Yeah, How Fedi Launched Luke: Okay, well, I think we are looking just to dig in more about Fedi Fedi Mint and, what does your launch actually mean? Because the app has been in beta for quite a while, right? what's happened, to make it that you can launch? Obi: Yeah, that's a very good question, because, we, the app from the, if you just focus on the app, from the previous version to the one we went live, there are only a few, changes. It was more about, did we have enough feedback from enough people on the ground that we thought that the product was stable enough, reliable enough? Obi: behind the scenes, we've done a lot of internal plus from trusted friends, external security audits of different elements as well. I don't like to publicize it because it's just something we do. We don't think it's something you should promote to saying, Hey, look at what we're doing. We just try to build the best that we can. Obi: and the really, big thing was to just say, a lot of people ask, is Fedi ready? And we wanted to get to a line where we thought it was good enough. And we got to that line. And then, we also wanted to have enough proof points in, the world. And again, we got to that line. So these things were separate things that were happening. Obi: And finally, it was very clear to us that we wanted to make the software, Ultimately open source. And that was a big call because, you know, we raised 21 million and, normally you go two routes. You go, you raise a little bit and you stay open source and so on. Or you raise a lot and you stay closed source. Obi: We believe that, over time, it's going to be considered, over the coming years, it's going to consider that you should always go open source no matter what you're doing, but we're in a transition. Five years ago, raising this much and going open source would be considered crazy, in five years time, raising this much and not being open source would be considered crazy. Obi: And we wanted to be, afforded in that. So. We actually went source available. It's called a business source license. So it means you go source available and you set a date where you must go open source or earlier. and we set those. So we cannot change it now. We cannot say we're going to actually change our mind. Obi: Well, the only thing we can say is that we're going to go open source earlier. that's the only thing we could do. Or if we decide to shut down, it's automatically open source as well. That's the sort of dead man's switch as well. Or we decide we're no longer going to develop the software. Obi: we've added caveats like that, which are not optional, but actually add more restrictions. So no one's going to complain with us going open source earlier. that was agreed and put in place on May the 4th. So May the 4th we review of this year, 2024, just for posterity. Obi: we, got enough proof points from different markets, that we felt that we're onto something here. Does that mean that we've finished? No, there's a lot of work to do, but enough to say that the idea of taking all of the best of freedom technologies out there. And putting them into one place and one app that's easy to use is something that's compelling to people. Obi: And also we had enough to see the federation model. of this sort of really simple to use and privacy preserving multi sig is also a powerful model. So the model was proven out. And then finally the software, we got to a point where we thought, it's, of course, we've got years of more development, but it was good enough as well. Obi: I think that was the final piece. And we thought, okay, we're ready to go. And we then set a date a few weeks after that. But even when we were getting close to it, we started the process of shooting a video because we just wanted to show people are wondering what were we doing for the last nearly two years and we wanted to show that as well.
Luke: what's the synopsis of the last two years? Like the big highlights?
Obi: so, I always say there's three phases in the business. There's initialization, of a startup, initialization, market product fit, in our case, not product market fit, I can go into why. And then, growth. And so, this phase that was, the end was finally, we crossed the line, on August the 6th, 2024, was the initialization phase. Obi: And so, if you think about the analogy of, like you wanted to have A shop selling designer pet clothing, and you've decided you have this crazy idea and you have to first fund it, find the people to build it, and then find the place, set up the store, make the clothes and, open. Obi: That's the initialization phase. And then once it's launched, you then. Start figuring out, okay, people come in, there's initial, interest, and then, you have this trickle of people coming in, you have to figure out what do they like, what do they not like, what do I have to adjust until it becomes this sort of regular viable business. Luke: That's the market product fit phase. And then you start saying, okay, I've got something that's working fully and then I will repeat it, make more and more and more, Widgets? Obi: Doggy fashion, Excel stores, whatever you want to call it. the last two years was our initialization phase. Obi: we had this, amazing product with FediMint. we had this initial set of, crazy people with Erik, the inventor of FedEvent, Justin, who's, who was also incredible engineer, who was actually the one who suggested that we make a commercial enterprise. up until that, both myself and Erik just suggested it would be an open source project. Obi: And then myself as well with my just, you know, only maybe six or seven months before we were finally finished selling. a Bitcoin exchange, the UK's longest running Bitcoin exchange. and so having that experience of building a company that was profitable and understanding what it meant to build something that custodies a large amount of money for people and provides them services is easy to use and all that sort of stuff. Obi: and everything around that customer service, everything around that. So, we were there, I had a visit to the Oslo Freedom Forum, and that was the catalyst. we did one talk at, Bitcoin Miami, and, Alex Gladstein saw that, he suggested I go to Oslo Freedom Forum. I went, my mind was blown and I also realized whenever you're thinking about a business, you have to always think about chicken and the egg and how do you find your initial market for eventually this product is applicable to everybody everywhere, but who's the first use case that has a demand so high that they're going to willing to go through the really buggy early versions and help you. Obi: Stabilize it to the point where it's something that people can click a button and it works everywhere. I realized that the community of human rights defenders and later on also humanitarian organizations fit that, need. We really cared about that need and we were concerned, we wanted to help, but we realized that this product could help in combination with the rest of the Bitcoin ecosystem. Obi: That's what's quite cool. FediMint is the thing that handles the custody, but you still need to buy things, sell things, find things, and so on, and that's where the Fedi app also comes into play, but without FediMint as the core to handle the custody, the rest didn't make sense. Obi: Then we started, it was, then you had this sort of scene from like the Magnificent Seven or so on where you're, you're finding your initial team members. So we found Renato Rodriguez, I chased her for like six months ago. She should have, you know, got a restraining order for six months trying to get her to join. Obi: just if you look at the initial team, it was just everybody, the whole team is amazing. But it was just trying to find these incredible people. they tended to just immediately understand the value proposition and the market we were trying to help and were already doing incredibly well in their own careers, but there was something missing for them. Obi: And when they saw this, it was like this fulfilled There's some other need that they had beyond the monetary need. The potential was amazing, but the mission side of it was what helped us bring on this incredible team. So I believe in philosophy, people, process, product. The philosophy was amazing, who we're helping, the potential, it's helping people and in so doing we're helping Bitcoin, in so doing we're helping the world. Obi: And that's a powerful philosophy and mission and that attracted this incredible group of people. And if you've got the philosophy and you've got an incredible group of people, they will put in the processes that will lead to the right product. Obi: It's like, let's say the video, for example. I said to Renata, I want a really powerful launch video and it should be like the best Apple keynote speech combined with a UNICEF or Save the Children commercial. That's it. That's the whole brief and that whole video. And somebody says, you need to go to Madeira. Obi: You need to say this. And I just woke up and I say what she says. But the whole elements of it, all of it was her and her team, Mary and marketing and everybody building that over the following X months. and I didn't actually see the video myself. Until less than a month before we launched it for the first time as a rough draft. Obi: And it was just basically perfect. My comments were like, I actually didn't have any significant comments, but that was the same for most of the team and the design of the product. We had this incredible designer, Skylar. I would give a brief and so as, Erik's brief was, I just want to be proud of something that I should be proud of, and that was it, you know? Obi: And I was like, it just needs to be really simple. And that's the high level. And I might give comments on a little bit here or there, but in general, whenever he gave me it, I would say, well, he Skylarized it, like just Skylarize it. And he would just come up with something that was great. and I think that was the last two years. Obi: We had the team we raised. again, the choice of investors was really, really key. I was very, very sure, especially from my previous experiences, that I only wanted Bitcoin on the investors, especially for the first couple of rounds. And when I've sometimes do talks on how to set up a Bitcoin company, my first slide says don't do it, but instead sort of a Bitcoin business, not a Bitcoin startup. Obi: And I explain the difference between the two. but one part is, if you do want to raise capital, be really careful about your choice of investors. The wrong investors will, well, and they don't mean to, but they will kill your business without meaning to, but the right investors will. So, we were really, really careful about our choice of investors and the initial team and then the initial team brought on the rest of the team after that. Obi: And that was the last, that's the last two years we've set ourself up very well. I did, being a classic entrepreneur, think it'll take six months, took two years. So I, so my estimation on that was a little bit off, but the end result, I'm really excited about. And now, now we're, now we're off to the races. Great news, everyone! Bitcoin, the inverse of clown world is out now. It's the successor to everything divided by 21 million. And it's based on the last two years of podcasts that we've done together. So if you like the show, you're going to love the book. Find the book on bitcoininfinitystore. com or on Amazon. That's right. We have our own store now. BitcoinInfinityStore. com. You can find not just books, but merchandise based on everything divided by 21 million, check out Bitcoin, the inverse of Clown World today and buy some other stuff while you're there too. This show is brought to you by Bit Box, our favorite hardware wallet. It's Swiss engineered and has all the most important security features to keep your Bitcoin safe while keeping a user experience that even your grandma can use. So visit Bit Box. Do Swiss slash Freedom to learn more, or use Code Freedom at checkout for 5% off. And remember, it's the Bit Box zero two Bitcoin only edition. Make sure to get that Bitcoin only firmware. How does Fedi Make Money? Knut: How does the app make money? Obi: Yeah. Knut: For the company? Obi: if you use the app, whenever you use the Freddie app. whenever a transaction happens, which would have occurred a fee. So it's a Bitcoin transaction, e cash or a lightning transaction. We add on an additional fee, 21, 21 basis points. So 0. Knut: Oh, yeah, Obi: And so, and the good thing is because we can charge in sats and I believe actually even fractions of a sat, it's a progressive tax, which a fee. Obi: So what I mean by that is. If you're sending, let's say 100 through, then you would be charged on 100. 21, but if you're, worth of value, but if you're sending through 1, then you'll be charged 0. 21 cents. And if you're sending through 0. 10, you'll be charged 0. 20. 0 to 1 cents. So it'll always be a very small percentage of what you're sending. Obi: Now, people might say in certain countries, don't they have mobile money and so on. But the problem is those mobile money systems have minimum fees. And it might be, 1%, which is not that bad, say. And it might be, even in some terms of scale, it could be half a percent, but with a minimum fee of 20 cents. Obi: So if you're sending a hundred dollars, that's okay. But if you're sending, 1, that's 20%. And so if you have someone who has a monthly salary of. 10 in some of these markets, that 0. 20 fee starts becoming quite a significant per transaction hit. So therefore it becomes unaffordable for you to use mobile money. Obi: So even though it's prolific above a certain wealth level, and so that leaves many people out, in the rain. But because this is progressive, if you're selling 10 cents, the, fee will actually round to zero. I mean it will be a fee, but you'll see it in sats, but if you were showing, trying to show it in local currency, it would basically be, it'll say about zero and then you click and you realize it's this small amount of sats. Knut: so, yeah. the big thing that I'm thinking of if I'm like. Playing this out in my head with where this could be in 10 years, like you could run entire virtual nations on a federation, right? If you have the money and the communication and whatever other useful apps, Obi: I think the big thing I think is, if you look at the internet, there are large organizations where, people use and they're highly centralized. You have a few people who may be wealthy enough to have their own direct connection to the internet, but the majority of people are connected on the internet. Obi: I don't know at this stage, millions of intranets, like household intranets effectively, company intranets and school intranets and so on, where it's one connection to the internet shared by multiple people. That's actually the majority of people. And it's that middle ground between these huge mega organizations that people are connected to one mainframe. Obi: With millions of users, I think there are very few of them now, but that was the denominant way at the beginning. It was these huge, centralized ways of connecting AOL, CompuServe, and so on. Now, they're actually relatively rare, but that was at the beginning. All of the internet was that. A few centralized parties, and I would liken them, conceptually in value terms, in value custody terms versus information custody terms, to, a coin basis. Obi: And also there were a lot of hobbyists who had their own direct ISDN connection to the internet. but now most people connect through these intranets where they get one router, one connection, and they share with everybody in their household. That would be a criminal of the Uncle Jim federations or in their school or in their football club or in their office. Obi: That's probably 95 percent of people and I think that this approach of federated model from the size from. Five or six people up to five or six hundred thousand, that range can cover 80, 90 percent of usage. How to Use Fedi(Mint) Luke: Can we go back to the basics of how feint works in the perspective of someone actually using this thing? So, you explained to us last time how it works, but just for my own sanity, check that I got it. if you are sending e cash within the federation, that is just. Luke: Direct between two users. There's not even a record outside of that. No one knows those transactions are even happening. Is that essentially correct? Obi: Yeah. So the federation helps you mint technically, because actually the user creates their own e cash, they create their own e cash, but it's unstamped and then they give it to the federation and they stick in an envelope. And they give it to the federation with some carbon copy paper on the inside the envelope as well. Obi: the federation collectively signs. So let's say all four people go stamp, stamp, stamp. And that makes it valid. then they give back the envelope to the user. The user then opens the envelope with the cache that they created, just some random piece of data. Obi: And they now have this Ucash, but the Ucash they've created now has got the four stamps on it, say, for the four of us. And so anyone else in that federation, any other, person who's also connected to the federation. They can just literally, directly give them this, random set of data. Obi: Let's say it's a picture of a fashionable dog and they can just give it to someone else. and the person will receive it and they don't really care what the data says. They just look, are the four stamps on it? Yes. Then it means it was stamped by the Federation, which means it's backed by a certain amount of information. Obi: Actual Bitcoin. Yeah. So take the whole, the full path. Someone deposits some Bitcoin in return. They also, along with the Bitcoin, send them an envelope, give them an envelope with this random piece of data in it to the Federation and the Federation receives the Bitcoin. Okay. I've received the Bitcoin envelope. Obi: Okay. I've received the Bitcoin. I will stamp. I received one, let's say. 10, 000 Satoshis. So I'm going to take my 10, 000 Satoshi stamp and stamp this envelope with 10, 000 Satoshis, pass it around to the other four, they all stamp the 10, 000 Satoshi stamp. And then give that back to the user. Obi: User opens the envelope and says, I've got, okay, I've got an e cash note with, with, that's been proven that the, that it's been validated by the guardians. So as long as we all trust the guardians are holding that and that they will honor this and redeem. That's it. So now I can pass it to anyone in the Federation. Obi: They receive it. They look at this picture of the cute dog, but what they're really looking at is, is it got the four stamps on it and it's 10, 000. So that means I've now received 10, 000 token. They can now at some point in the future, Often they do it immediately if they've gone into connection, but they don't have to. Obi: They can give it back to the Federation. Federation will receive it and each one will check their own signature of the guardians. Okay, it's properly signed. Therefore, I'm willing to, and they might give them a Bitcoin address to send the money on chain to. Obi: So they will receive it, it looks good, they will then, record that this, e cash note has been spent. But they don't know, of all the e cash they received, which one it was, because each one they received in the first place was in an envelope. So was it the first one they received, or the middle one they received? Obi: They have no idea. It could have been received yesterday or a month ago. No way. All they know is, I must have stamped it, so it was one of the ones I stamped. And then they will look at the address the person's asking to send the Bitcoin to, and they will take some of the Bitcoin that they're holding in the multi sig that we're holding between the four of us and send it to that address. Obi: So that's called Redeem versus Mint. Now, the user experience from a user, we can get onto Lightning, that's another level of complexity, but it's simple just for Bitcoin and eCash for now. Obi: Someone sends me Bitcoin or I send it to myself from an outside wallet and I receive e cash. And then someone else in the, in the federation wants to, once I want to pay them some e cash, they will give me, they will give me a QR code to, to scan to pay and I will scan. And literally the e cash that's on my phone gets sent to them directly. Obi: From me to them, one to one, that person when they receive it could keep it on their phone or they could say, you know what, I want to send that back to the federation and they can send it back to the federation and then the federation can destroy that, issue them new, fresh e cash in different denominations, maybe not 10, 000, but 10, 1, 000, you know, just like with notes, you could go and get change. Obi: Yeah, because if someone transacts, if you're saying it gets sent from one computer, phone being a computer, whatever, one device to another, well, that original device would still Obi: Yes, Luke: copy of the thing on, right. Obi: So they will still have a copy. Now you are in the same, this is where the community aspect works, you are in the same community, If you're in the same community, and the person, it's a merchant and you receive, and your phone will remember when you received what e cash, yeah? Obi: Even though it's private, you do know this e cash was received at this time and this time for, and so, especially when you integrate with points of sale, it will say, well, you received this e cash for this purchase. You'll know that. so then if you go to redeem it, at the end of the day, and some of it doesn't match, you will know as the merchant, which e cash was involved in that. Obi: You'll say, well, the e cash involved in this transaction. And that transaction was with John. So you've got proof of work. it's the same as if you have a merchant and you receive cash and then you finally got the end of the day to a bank. Obi: And some of the notes are counterfeit. Now, you don't find high levels of counterfeit notes in a community where people know each other. It's normally in these widespread communities. But in those scenarios, what most people will do and how the default way the app works is the moment you receive it, it immediately goes off and redeems it and then issues itself back new, new change. Obi: Yeah, that seems like a good default implementation. but if you have no internet connectivity, you can still use it and still receive. even if you can't send over the internet, you can create a QR code, which contains the e cash in the QR code, and the person can literally scan it and receive through the screen. Obi: Because as long as it's the QR code, the e cash note is just some text. So a QR code can represent that text and you can scan it, even if you have no data. So for example, it could be you're in an area where you have no data, rural, Latin America or so on. But it could also be something more innocuous. Obi: You could just be in a big sort of, But the thing is is that you might be at a Glastonbury like concert and there are a thousand phones and there's no data. Or you're in an indoor conference place underground and there's no data. But you can still take payments or the merchant has internet because they're the ones who really need it. Obi: But the buyer doesn't and so in which case the merchant has internet because they're connected wired in because they're fixed, but the buyer doesn't need to have internet to pay and the merchant will just take a risk just like in most merchants in high streets they accept a certain amount of breakage and a certain amount of transactions are gonna be charged back by, credit card companies and so on. Obi: I used to be a CTO for a major pan-European, online auction company. At the time I was competing with, eBay and so on. we were in a headliner, 300 hundred people working for me in technology. It was a very big technology offering. And we were doing millions of transactions a week. Obi: It was very high volume. And in those e commerce sites, you just accept a certain amount of breakage, a certain amount of returns, and a certain amount of chargebacks, even if you do nothing wrong and you just factor it into your costs. For the benefit of the simplicity of the experience. Fedi and Nostr Knut: you mentioned Nostr before, like, what's the marriage between Fedi and Nostr? Well, I would say right now, we are, because I think. Knut: we're beyond dating. We're engaged. But we want to really take the two footed tackle of no return, to use a football euphemism. a web of trust thing, right? Obi: Yeah, I think, whenever, from the first point I saw Nostr, a lot of people thought it was just social media and so on. Obi: I think social media is Trojan horse is the wrong word, but it's the, initial vector by which it infiltrates communities. But what you're actually doing is building a simple, trust system and a simple discovery system. It's a form of decentralized search and it's a form decentralized identity. Obi: Cause you, to search, you have to identify things to be able to search. So they're sort of two sides of the same coin. now the first thing you're using it for is identifying people who want to speak publicly and share their thoughts and so on and so forth and follow them and give feedback and like. Obi: But it always seemed to me to, way more powerful than that. And I think now people, generally understand it that way. And so, What we've already done, in Fedi, and a lot of developers really like the way it works, if you sign up to Fedi, or if you download the Fedi app and start using it, you, first of all, you don't need to give your email, you don't need to give your phone number because it's not required, but, we do ask you to come up with some sort of Username for yourself. Obi: That doesn't even have to be unique, by the way. We will add a unique element at the end, from it. But what we do is, whenever you create that label, which you can change the name, but we create, an NSEC, which is a Nostr, identity effectively. A unique identity and we automatically create that for you. Obi: So again, for our users, we don't want to start educating them on the history of Austrian economics and Bitcoin and inflation at the beginning or a Nostr, et cetera, and how it works and relays. And we just want them to start using it. then subtly over time we expose certain features of it. So people become curious and then eventually. Obi: You want to learn how this thing that's delivering value works, but we've put proof of work first, proof of talk second. So we educate through letting people see the benefits. And then there might be some people might say, well, how does this car thing work? Or how does this fridge thing work? But I don't need to know how refrigerant works to be able to use a fridge or how microwaves work to use a microwave. Obi: When they want to know how all this stuff works, but we benefit first. So, and so and that's how it works with Nostr We immediately give you an NSEC. Obi: And so because we've got that if you go and use unleash. chat, for example within the app It will go and you click login and there's one option login by Nostr You click that and it'll just within the app pop up something saying Nostr Do you want to log in with Nostr? And you click yes, and you're logged in and it just works and then you, and then also now you're logged in and then you can, and then you click, deposit money and instead of having to go to a different app, copy and paste the QR codes, it just, it pops up and says, do you, this, this, what the app's asking you to deposit this amount of money? Obi: Do you want to go ahead? Yes. And then it's e cash. Is, is converted into lightning and then that you pay by lightning. But from your point of view, there's a circling key for three or four seconds. You have now credited your account. Do you want to withdraw the money back account? You click withdraw the amount. Obi: Three or four seconds, it's been withdrawn to your account and, and it's all within the same app. so, but that only works because now if you, close the app or delete the mods, because you can delete these mods or these additional pieces of functionality, they're basically webpages, but the icon for them, and they have an app like experience, but they're actually just webpages. Obi: and then you go away and then you delete the app from your service. Like six months later, you come back, you, you, you enter your 12 words, you're, you're re log on. And then if you scan to join a federation again, it will recognize that you were a member of the federation before, and it will reconstitute and recreate all your e cash and put it back on your phone. Obi: And then if you click on, Unleash your chat or Stacker News or anyone that supports logging by Nostr. Your login with the same details and so on. So you basically, and we want to make that even more seamless. So from 12 words, your entire life can you think about moving from one mobile phone to another, where you have to move all your apps, your banking apps, your chat apps. Obi: And now you could do that with just go and also try moving from an iPhone to an Android phone, Android to an iPhone. It's a nightmare. Here you could just download the Fedi app on your iPhone. this is some far point in the future. You don't have just chat, but you also have voice. You have video, all of that running from encrypted chat. 12 Magic Words Obi: you have access to money from, custody and payments. You have access to all these apps and then you back up 12 words. And there's something we call social backup, which is mind blowing, but, that's in beta. But let's just say backup 12 words, and then you delete that app, go to a different phone, could be an Android or an iPhone, and you just enter 12 words, and your entire thing comes back. Obi: Not partially back, but it all will come back. based on just those 12 words and that's only made possible because of Nostr and we want it over time. Knut: mean, when you think about it, it's insane. It's already insane with bitcoins, with the 12 magic words, because like every time I pass a security check at an airport, I think that go ahead, have my 200 milliliters of toothpaste. I'll, I have my 12 magic words, like it's the ultimate fuck you to, to anyone trying to meddle with your business, right? Knut: that's the dream. I mean, we're not fully there, but it's, I would say it's like, we're like 90 percent there, but to extend beyond just your Bitcoin, Nostr is the protocol that allows us to do that because it's notes and other stuff and the other stuff can be, an encrypted version of the settings and so on that you have that we can store and be willing to pay for. Obi: And then when you recover, you have your bitcoin, but then you can go off and send a request to say here, I'm willing to recover this file. Here's some zaps for the file and you get the file back and that additional file then contains the information. Okay, these are the federations you are a member of, you rejoin them. Obi: These are the mods that you had, they're reset up. These are the settings you had, they're reset up. And then you log on them automatically using Nostr as well, the NSEC and Nostr login. from your point of view as the user, 12 words, it's back. I mean, you might have to drink a cup of coffee while it's happening, but 5, 10, 20 minutes later, it's back. Knut: it's amazing, and it's an inheritance plan. Like, you can live forever by just letting your descendants, giving them the 12 words when you're on your deathbed. Obi: backup also becomes really powerful, because social backup means that, cause the 12 words is still another thing to secure. And it's sort of one of these turtles all the way down type scenarios. Okay. We've got all this incredible security Fort Knox like, but behind them, but I walk around the back of the Fort Knox is these 12 words that's stored. Obi: you also give one to your cousin and you say, look after this as a backup. And your cousin stores it on a fridge magnet. You know, you don't know, or you don't know your, your, your security is the lowest common denominator. Obi: For your 12 words. And Knut: is never stronger than the weakest Obi: then the weakest link. And so with social backup, which is definitely an early beta. what we can do is use the power of the federation where we can take your 12 words, encrypt them and then split it up between the four guardians in this case, or seven guardians or 40 guardians or whatever. Obi: For larger federations, and they all hold a piece of your encrypted piece of your, of Knut: is important here. Obi: Yeah. Knut, what are you doing over there? I'm stamping my seed. Everyone tells me I should, that it's good for bitcoin security and whatnot, and that I should go balls deep into bitcoin security, so I'm stamping. You don't do it like that, Knut. You don't stamp that seed. You stamp your seed phrase. What? Your seed phrase. Oh, so that's what these things are for. oh, I get it now. That's exactly right, Knut. And you can get everything you need to stamp your seed phrase at stampseed. com. And be sure to check out our limited edition Everything Divided by 21 Million Titanium Seed Plate. And use code INFINITY at checkout for 15 percent off. That's fantastic! And it hurts way less!
Redundancy in Fedi Luke: So this gets me back to what happens when one of the guardians drops off, and if it's like in a permanent way, if that one guardian is holding a piece of everyone else's 12 words, does everyone Obi: Yeah. But it uses a prot, this is crypto, where cryptography comes in. So it's not like. We've taken your 12 words and split it up free between four guardians. Instead, you encrypt it using a scheme that allows each one of the four of us to have a cryptographic piece. Obi: But as long as any three of us combine our piece together, we can recombine. It is, it's called, SHAIR Secret Sharing Scheme, but it's a way of cryptographically achieving that. Luke: Excellent, I think you mentioned last time as well that if a guardian does go down, essentially you can replace that guardian, can you take us through that, adding or replacing a guardian if that ever were to need to happen? Obi: replacing a garden is, probably one of the most complex things. And so you wouldn't necessarily replace a guardian, but what you would do is, some, if someone were to go down, there's two different things. The machine. Or the guardian, the actual person. So if the machine goes down, you can set up a new machine and you can recover the status of that. Obi: You can, you can download the 30 minute software on that new machine. So that's the actual server that's running. And that will then connect to the rest of the federation and, and carry on. So as long as the guardian has a backup of their keys, they can recover that one machine and, and catch up and it'll automatically catch up. Obi: Just like if you turn off a Bitcoin node and turn it on, it will reconnect to the Bitcoin network and catch up. It's a similar concept. so that's if a machine went down, if a machine was temporarily disconnected from the internet or, lost power, it would just restart and reconnect and you will have zero downtime as a user, as long as it's still running and active. Obi: And this will all be, you'll notice that the performance will still be the same, but if you went into settings for that federation, you'll see that three of the four are running, so one is not running, but that won't affect your usage. Obi: Is the N of M like a ratio, or is it always N 1, for example? It's a ratio. the number of guardians that, you need to have is dependent on how much redundancy. So if you want to be able to handle one guardian going down, then you'll need to have, one times by three plus one. So that's four. So that's why you need three or four. Obi: if you want to handle two going down, then you need two times by three plus one, which is seven. So it's five of seven. 7 of 10, 9 of 13, and so on and so forth. You can have more than that, but the time that you get additional redundancy is every 3, but you can have, for example, 4 of 5, if you wanted to. Obi: Anyway, so, yeah, in the event that someone goes down, that the machine goes down, you can recover. recently there was an issue where one machine, where two federations, had an issue with the domain name for one of those servers. And so if the domain name for someone is no longer available, you can now, with the update that came out a couple of weeks after that, you can modify, the domain name Obi: for a Guardian 30 minute server, and it would communicate that securely with the other, Federation servers and then reconnect and, continue to operate. But it's important to, even in that scenario where the Federa Guardian, the domain name server went down, the Federation itself, Continue to operate because there was still at least free running. Obi: So there was no downtime for the user. Whereas if, if we hadn't been federated, then for the one week or so where that was down, the users would have had no access at all, which would be the case where you're connecting to a centralized or a single server, offering. now, if one of the guardians, for some reason, the actual people who are running the Fedemyst server, for some reason, you no longer trusted them, they'd been helpful all their life and all of a sudden they decided, or they've been turned by some, malevolent nefarious actor. Obi: Then you, if you could in theory pass to someone else, but in practice, you know, how do I know that the other person isn't still going to continue to operate it and so on and so forth. So what you actually want to do is set up a different federation and transfer people, the other three guardians and inform people with a different set of four people. Obi: So those three, plus someone else. And just tell people to transfer their balances across. But transferring balances across is as easy as doing a lightning transaction from one server to another. You can, you know, within the FEDI app, be a member of multiple federations at the same time. I mean, right now, I mean, I'm a bit of a power user, but I'm a member of, over a dozen different federations from around the world. Obi: I mean, well over a dozen, I think, yeah. and as we've, I'm sure there's people in the team with way more than that. but obviously I can't advertise the names because many of them are private federations. So, but there's a few public ones, but there's way more private ones. Interoperability Luke: So is the e cash, if you're in multiple federations, is it interoperable there, or it's like a more like a, it's a lightning transaction between those two federations, but it's e cash that lives Obi: You got it. It's, E cash lives within its federation, but the interoperability layer for most people is not on chain. It's for the vast majority of people, it's Lightning, so, but the user experience of sending e cash from one person to another in the same federation, sending e cash from one person to someone else receiving Lightning. Obi: on a different wallet that's got nothing to do with Ferdie Mint. And finally sending e cash from one person in one federation. To someone else in another federation over the Lightning Network in between is exactly the same. From your point of view, QR code scan and the system will combination of the Fedi app and or whatever Fedi Mint compatible app you're using and Fedi Mint servers will make the experience Obi: I just need to send the person the cash. In this case I can send e cash out over Lightning and that's my job is done. And then the other side would be a Lightning wallet and it will receive. And in this case, I will send e cash over Lightning to another federation, but I don't even know if it's another federation, it's just a Lightning address. Obi: And then the other federation, receives the transaction and the other 30 minute server receives e cash on the other side. But from a user's point of view, this is the thing that also took the two years to make the experience the same. You just don't have to worry about which one is doing. Obi: The fees will be slightly different. One won't have a Lightning component to the fee, e cash to e cash, but, the other two will because it will be like, in both cases, it will be e cash to Lightning, from your point of view. Luke: So is there a fee to send e cash to someone else in the same federation? No, I guess. Right. Obi: It depends on the federation. the federation, could choose not to charge a fee and many in these times choose not to because they're doing it for friends and family and so on and the fees are minimal. the Ferryman protocol does support, what we call a DDoS fee. So basically you're spending effort time Obi: to sign these notes, the issuing is done by the user, but the stamping takes time. you're signing something cryptographically, that's effort. and you're also doing it in a federated manner, so you're coordinating and then you're all collectively signing. Obi: So, to avoid DDoS, you can turn on a fee and, by our calculations, it doesn't need to be very large, one sat per note that issued is enough to prevent, because if someone really tried to DDoS you at scale, they could, but on normal sort of consumer laptops or hardware, they'll have to spend, hundreds of thousands a month at that sort of, one sat per note, and in which case you'll say, fine, you're giving me hundreds of thousands of dollars worth of Bitcoin to burn my, CPU. Obi: Well, not to burn it, but just to heat my CPU. so you can charge a fee. And I think some will experiment with charging a DDoS fee, which is similar to Bitcoin. the fees in Bitcoin are a DDoS protection vector. So it's the same concept. Fedi's Roadmap Knut: All right. So, what's on the roadmap? What's going on? How does the future look like? What will you be working on the next five years? And where do you see FedeMint going? Obi: that's actually, the most, fun phase. up until now, we had a hypothesis and we had some early feedback, but a lot of it was based on, A hypothesis and theory as to what we thought people needed and we felt that freedom technology had got to a stage where they were good enough to provide this combined experience. Obi: And that was a hypothesis. And we think we've got early validation, but we built that. Now it's life. And now it's the fun, but it's also the scary bit because we now actually see people using it and we test all our hypothesis. And this is the point where you have to be very detail oriented, very much listening to the users and listening to what they say Obi: we cannot ignore if there are. Parts of our hypothesis that are incorrect, we have to adjust to support that. So it's going to be a lot of listening and we've already got hundreds of requests for feedback. and then working to rectify, or deal with the questions or feedback they've given us or the suggestions they've given us. Obi: and we're going to continue to iterate and then we bring it back out to users and see what they think. And we keep in that loop. This is the market product fit loop until. The product that we produce, fits the requirements of the market. Now, again, I, I'm hoping that takes six months or less, just like I hoped it took six months or less Obi: for the initialization phase, but it might take less. It might take a bit more, but it's fun. and that's the next phase. After that, we then go into the growth phase. Once we know we've got something that's repeatable, that really. is at the quality level that users need for it to be used a daily part of their life. Obi: We'll then go into growth phase and that's where we'll really, you know, pull down, put our pedal to the metal and, and just repeat, repeat, repeat until. You know, billions of people are using this around the world, but that, that's phase three. And I'm, I'm very focused on this phase. You don't want to rush into phase three. Obi: We're not going to rush to grow the numbers, until we are very sure that we've got something that's really slick, really reliable, and where we're meeting a clear demonstrable demand consistently. And that process is called human centered design. So it's not focused on this is my app, this is what I want, and I'm going to keep trying to make you agree with what I want. Obi: this is what we've built. This is our first stab at it, but we're going to keep iterating until it serves your need properly. And that might require some, this is what makes this one very hard because it requires a very different mindset to the phase one. Phase one is like We can do everything and the impossible is possible phase two is really being pragmatic. Obi: Or very self critical and being very open to killing your darlings, as the saying goes, you know, and saying this is not working or, or there's some fundamental issue. I mean, I don't think this will be the case at this stage, but if the feedback was from our market that we need to make some fundamental changes that would mean that 80 percent of the code we built has to be thrown away and have to start again. Obi: Well, that's what we're being told. we've got far enough to think that's highly unlikely. cause most of the feedback, like some of the big pieces of feedback cause how can we make it easier to set up federations? So that's a really good sign because lots of people said there's only going to be a demand for like free federations and it's going to be very centralized. Obi: Well, a very large percentage. I don't want to give it. These are the very large percentage of all our queries so far have been, how can I set my own federation up? So even based on those queries, there's not going to be free. You know, I can put it that way. Luke: Super quick question on that, I guess, is it the Fetiman software? Is it on, for example, the note in a box, solutions, the umbrellas, start nines, et Obi: Well, that's part of the feedback that we're getting. For example, can we set it up? Can you integrate with Umbro? Can you integrate with Start9? Can you integrate with RastyBlitz? can you make it simpler to set up? So, I think, a lot of that's done by the FediMint team. Obi: Because remember, FediMint is an OpusSource project versus a different OpusSource project. At some point in the future, it will be two different open source projects. However, we are using them as the bedrock, because if you want to custody significant amounts of value We know that you want to go multisig. Obi: Multisig for significant amounts of value is the best standard, and also you want privacy, so then privacy and multisig, that's FedEvent, basically. but, on the FedE side, we can do a lot as well. So we can provide, even though it's open source software, we can take it and provide it. Obi: again, it will be open source, but tools to help you build it really easily or put efforts to integrate with people like Umbrell and Start9. we've already had an integration with an organization called Clover, which we've been working on, and you're going to see more on that. But from our point of view, that's a lot of where the work is. Obi: Also you want to connect this to the Lightning Network. And connected to the Lightning Network and maintaining a reliable connection is not easy. it can be complicated for people, especially managing liquidity. And now again, over time, I could get easier, but right now it's not easy. Obi: There are organizations like, Breeze and others who make that easy. and you just saw an announcement from Erik, where they've already started, showing connectivity and support for LDK, which is this cross, LSP standard. So, again, we at Fedi can provide tools for FediMint, or people who are using FediMint, whether it's with Fedi or someone else, that make it really easy. Obi: And again, our aim is one click, and you have a connection. You can set up your own lightning node that's set up in a relatively good way, so it'd be relatively reliable, but you don't have to manage it yourself. Or, you can connect to one of these LSP's and for a fee, they'll just handle all the light and management, but you're still in a trust minimized way. Obi: So there's, but given all the feedback we're getting, it's not, this is completely wrong. You need to go back to the drawing board, it's all, okay, I get it, but you need to go further. You need to integrate with more. You need to make it easier. so that's a good sign that we're on the right track. Knut: Yeah. So, what about this date when you go open source? is that public or, when you have to go open source, it might be then or Obi: in the, it's, it's, it's memorializing the business source license. In fact, we memorialized it. We actually have this memo memorializing when it happened. when we launched Freddy, we, we did this thing on the Bitcoin block. You can see it. We were established on a certain block. Obi: And we said Fedi is here. When we, quietly on May the 4th, we also put something that said Fedi colon and it was a hash. That hash is a hash of a memo. And the memo, which is on our, Fedi's got an open source, you can see the link and you can verify it. Showed that on May the 4th, the code became business source license. Obi: And by January the 3rd, 2026 or earlier, we must go, open source. And if we were to shut down or to stop development, we will instantly go open source. and so, so that, and we put it in block. I tried to find a core block. So it was block 8, 42069. It was actually was the block that was the core block as well. Obi: so yeah, it's, it's there. And, that's the date. We, we cannot go open source later than that. And we may very well go open source a lot earlier than that. Wrapping Up Luke: Hey Obi, I think we could keep on grilling you on this and that little detail, but this has been really enlightening, fantastic to see how far this has come, even since our last conversation back in October, and yeah, just looking forward to everything you guys are doing, and I guess just as a last thing, people can now grab the Fedi app and Public federations are available to start to try Obi: federations and there are, and you can set up your own federation There's a lot, I don't like to talk too much about what's coming in future because we just work on everything in order of customer demands. So if customer demand comes in, that changes the order, but we're working really hard to make it, It's already easy for if you're quite technical, but we're going to make it easier and easier to set up a federation, so keep looking out because that's a very common request to set up a federation yourself, and we want to see what people do with it, create Fedi mods, create federations, use it, give us feedback, and we will continue to work on making an incredible, Open source interface portal to this freedom technology world. Luke: Absolutely fantastic. We'll need to keep on having these conversations regularly, get updates because always fantastic to hear about this and good luck moving forward and I think we'll be trying some FETI stuff in our futures here. Lots of cool things have come out of Nostriga and Baltic. Honey Badger by Luke: I'm exciting to see that. And anywhere else you want to direct our listeners and viewers. Obi: So for Fedi, that's probably the best place because everything, that's a jumping off ground for everything else. And that's Fedi, F E D I dot X, Y, Z. Luke: Fantastic. Obi: One of the cooler things that came out in Nostriga and Honeybadger was of course, yes, the inverse of clown world, our new book, and we want to give you one. if you're not given one during this weekend, you'll find it on bitcoininfinitystore. com. Thank you very much. Luke: and we need to sign it for you. Yeah, we'll do that offline. But Obi, thank you again. And this has been the Bitcoin Infinity Show. Thank you for listening. Obi: Thanks.
-
@ 000002de:c05780a7
2024-10-17 23:13:45In the US its that time of year. Election season. My mailbox is littered each day with crap from these clowns. They go straight into the trash. As I was throwing one away today I saw that it said, So and so is one of us. The classic appeal.
I have news for you younger stackers. No politician is one of us. Even the rare good one. You and I have more in common with our neighbor that disagrees with on politics than we do with a politician that seems to agree with us. Why? The politician doesn't produce anything of value. They do not work for you and I. They work for themselves and their corporate overlords.
Those in the higher positions have even less in common with us. They the servants of the elite. As much as they may try to tell you that they come from middle class roots. Or they had to work their way up, they are in a privileged position.
If we are to ever live in peace we must tune out their divisive messaging and learn to live in peace with our neighbors. We do not have to agree on every issue. It is rare when I have had an actual issue with another person that related to political positions they may hold. The truth is, most of them do not matter. But they are amplified with the intention of dividing communities.
Divided communities are easier to control. You want to be free? Free your mind. Talk to your neighbors. Get to know people around you. Provide help when you can. Be a good neighbor. Don't look for areas to divide on. Look for areas of common ground. When you disagree, agree to disagree.
It seems like we have forgotten out to do that. This is what I'm trying to do at least. I can't change my community but I can affect those I interact with by my actions.
originally posted at https://stacker.news/items/728892
-
@ 4ba8e86d:89d32de4
2024-10-17 22:26:20Ele oferece a opção de utilizar autenticação de dois fatores para aumentar ainda mais a segurança. O aplicativo foi desenvolvido em 2016 pelo americano Mo Bitar para oferecer um lugar seguro para armazenar informações pessoais sem a preocupação de que seus dados sejam coletados ou expostos a terceiros.
O Standard Notes é um cofre de aço para seus dados mais confidenciais, que protege suas anotações e arquivos com criptografia de ponta a ponta líder do setor e auditada 4x. Armazene com segurança todos os seus dados confidenciais em um só lugar e acesse-os de todos os seus dispositivos, com a certeza de que seus dados estarão sempre protegidos pelos mais altos padrões de segurança.
Ao contrário de outros serviços de anotações, o Standard Notes apresenta medidas de segurança avançadas e controles de privacidade que protegem seus dados contra hacks, violações de dados, acesso do governo e até mesmo acesso de funcionários. Ele defende a privacidade dos usuários e apresenta políticas revisadas por pares e auditáveis.
O Standard Notes utiliza criptografia de ponta a ponta para proteger todos os dados, que são criptografados sempre que tocam um disco, como em seus servidores ou no dispositivo do usuário. Auditorias independentes são realizadas periodicamente em sua criptografia, aplicativo e código do servidor para garantir que os dados estejam protegidos. O código aberto do Standard Notes permite que os usuários tenham clareza sobre como seus dados estão sendo tratados em cada etapa do caminho. Ele não coleta ou armazena informações do usuário, como endereço IP ou agente do usuário, para proteger a privacidade.
-
Acesse a F-droid ou Google Play Store em seu dispositivo Android.
-
siga as instruções para criar uma conta ou fazer login em uma conta existente.
-
Comece a criar suas notas e armazenar outras informações importantes com a tranquilidade de que seus dados estão seguros e protegidos.
https://github.com/standardnotes
-
-
@ 4ba8e86d:89d32de4
2024-10-17 22:21:39Ele é baseado no conceito de "separação de privilégios", o que significa que ele separa o sistema operacional em duas máquinas virtuais separadas, uma para o sistema operacional e outra para as aplicações. Isso permite que as aplicações rodem em um ambiente isolado e seguro, sem acesso direto à rede e aos recursos do sistema, protegendo assim a privacidade do usuário.
O Whonix foi lançado em 2012 como uma iniciativa do desenvolvedor alemão Patrick Schleizer. Ele criou o Whonix como uma resposta à crescente preocupação com a privacidade e o anonimato on-line, especialmente após as revelações de Edward Snowden sobre a vigilância em massa realizada pela NSA.
O Whonix foi projetado para ser usado em conjunto com a rede Tor, que é uma rede de comunicação anônima que permite que os usuários naveguem na internet sem revelar sua localização ou identidade. O Whonix permite que os usuários se conectem à rede Tor de forma segura e anônima, sem expor seu endereço IP ou outras informações pessoais.
O Whonix funciona em duas partes: o Gateway e o Workstation. O Gateway é a máquina virtual que lida com todo o tráfego de rede e estabelece a conexão com a rede Tor. O Workstation é a máquina virtual que você usa para suas atividades online. As duas máquinas virtuais se comunicam apenas através de uma rede privada, o que garante que o tráfego da rede esteja completamente isolado.
O Whonix vem pré-configurado com várias ferramentas de privacidade e segurança, como o navegador Tor, o cliente de email Thunderbird com suporte a criptografia, a suíte de criptografia GnuPG, entre outras. Além disso, ele possui uma série de recursos de segurança, como proteção contra vazamentos de DNS, capacidade de rotear todo o tráfego através da rede Tor, bloqueio de conexões não autorizadas, entre outros.
O Whonix resolve o problema de privacidade e segurança online, fornecendo um ambiente totalmente isolado e anônimo para navegar na web, enviar emails, trocar mensagens instantâneas e outras atividades online. Ele também ajuda a proteger os dados pessoais do usuário de roubo de identidade e outras ameaças de segurança.
Além disso, o Whonix é uma ótima opção para quem vive ou trabalha em países com censura na internet, já que a rede Tor é capaz de contornar bloqueios de conteúdo e oferecer acesso à internet de forma anônima e segura.
O Whonix é uma solução completa para quem busca privacidade e segurança online. Ele oferece um ambiente totalmente isolado e anônimo para todas as atividades online, garantindo a proteção dos dados pessoais e a privacidade do usuário. Com uma série de recursos de segurança e ferramentas pré-configuradas, o Whonix é uma ótima opção para quem deseja navegar na web com privacidade e segurança, independentemente de onde estejam.
https://github.com/Whonix
https://www.whonix.org/
-
@ 83794dfe:e46c6636
2024-10-14 19:40:37BRM 200 km – Samstag, 28.09.2024 05:30 – 09:30 Uhr
We left on Saturday morning and enjoyed a great day on the bike, meeting some friends along the way and dropped some.
with an average speed of 26.5 we needed around 7.3 hours to complete the track.
It was a sunny but windy day at the end we even ended up with some cold shower at the end.
A Brevet is not a race along the way we had to pick up some proof that we visited certain points like gas stations.
-
@ 8cb60e21:5f2deaea
2024-08-18 20:57:03 -
@ 3bf0c63f:aefa459d
2024-05-24 12:31:40About Nostr, email and subscriptions
I check my emails like once or twice a week, always when I am looking for something specific in there.
Then I go there and I see a bunch of other stuff I had no idea I was missing. Even many things I wish I had seen before actually. And sometimes people just expect and assume I would have checked emails instantly as they arrived.
It's so weird because I'm not making a point, I just don't remember to open the damn "gmail.com" URL.
I remember some people were making some a Nostr service a while ago that sent a DM to people with Nostr articles inside -- or some other forms of "subscription services on Nostr". It makes no sense at all.
Pulling in DMs from relays is exactly the same process (actually slightly more convoluted) than pulling normal public events, so why would a service assume that "sending a DM" was more likely to reach the target subscriber when the target had explicitly subscribed to that topic or writer?
Maybe due to how some specific clients work that is true, but fundamentally it is a very broken assumption that comes from some fantastic past era in which emails were 100% always seen and there was no way for anyone to subscribe to someone else's posts.
Building around such broken assumptions is the wrong approach. Instead we should be building new flows for subscribing to specific content from specific Nostr-native sources (creators directly or manual or automated curation providers, communities, relays etc), which is essentially what most clients are already doing anyway, but specifically Coracle's new custom feeds come to mind now.
This also reminds me of the interviewer asking the Farcaster creator if Farcaster made "email addresses available to content creators" completely ignoring all the cryptography and nature of the protocol (Farcaster is shit, but at least they tried, and in this example you could imagine the interviewer asking the same thing about Nostr).
I imagine that if the interviewer had asked these people who were working (or suggesting) the Nostr DM subscription flow they would have answered: "no, you don't get their email addresses, but you can send them uncensorable DMs!" -- and that, again, is getting everything backwards.
-
@ 8cb60e21:5f2deaea
2024-08-18 20:50:48 -
@ 4ba8e86d:89d32de4
2024-10-17 22:16:21Ele utiliza criptografia forte para criptografar os arquivos antes de serem enviados para a nuvem, garantindo que apenas o proprietário dos arquivos tenha acesso a eles.
O Cryptomator é gratuito para uso em sistemas operacionais como Windows, macOS e Linux, mas requer uma licença paga para uso em iOS e Android. A licença pode ser adquirida por meio do ProxyStore https://digitalgoods.proxysto.re/en , que aceita pagamentos em Bitcoin e moedas fiduciárias.
Desenvolvido por Tobias Hagemann e Christian Schmickler, dois engenheiros de software alemães, o Cryptomator surgiu com o objetivo de criar uma solução acessível e fácil de usar para proteger arquivos armazenados na nuvem. Lançado pela primeira vez em 2016, rapidamente ganhou popularidade na comunidade de privacidade e segurança cibernética.
O Cryptomator é uma ferramenta simples para autodefesa digital. Ele permite que você proteja seus dados na nuvem sozinho e de forma independente.
A maioria dos provedores de nuvem criptografa dados apenas durante a transmissão ou mantém as chaves para descriptografia para si. Essas chaves podem ser roubadas, copiadas ou mal utilizadas. Graças ao Cryptomator, só você tem a chave dos seus dados em mãos.
O Cryptomator permite que você acesse seus arquivos de todos os seus dispositivos. É fácil de usar e se integra perfeitamente entre seus dados e a nuvem.
Como o Cryptomator protege seus dados?
A tecnologia do Cryptomator atende aos padrões mais recentes e criptografa arquivos e nomes de arquivos com AES e comprimento de chave de 256 bits.
Para começar com o Cryptomator, você atribui uma senha para uma pasta - nós a chamamos de cofre - dentro de sua nuvem. Isso é tudo. Nenhuma criação de chave complicada, nenhum registro, nenhuma configuração!
Para acessar o cofre, basta digitar a senha novamente. Você receberá uma unidade virtual criptografada para a qual poderá mover seus dados - exatamente como uma unidade flash USB. Sempre que você armazena algo nesta unidade, o Cryptomator criptografa os dados automaticamente. Bem simples, certo?
A tecnologia por trás disso é de última geração e criptografa arquivos e nomes de arquivos com AES e comprimento de chave de 256 bits. Isso significa: se alguém examinar a pasta em sua nuvem, não poderá tirar nenhuma conclusão sobre seus dados.
Você não precisa confiar cegamente no Cryptomator, porque é um software de código aberto . Para você como usuário, isso significa que todos podem ver o código.
Auditado por pesquisadores de segurança
Além de auditorias de segurança independentes , o software é continuamente e publicamente testado de forma automatizada e possui uma qualidade de código mensurável e cobertura de teste muito acima da média do setor.
O Cryptomator é uma poderosa adição ao seu arsenal de segurança, fornecendo uma camada adicional de proteção aos seus arquivos armazenados na nuvem. Ao combiná-lo com boas práticas de segurança cibernética, você pode desfrutar de maior tranquilidade e controle sobre seus dados pessoais e confidenciais.
O Cryptomator é uma solução confiável e acessível para proteger seus arquivos na nuvem. Com sua criptografia forte, código aberto e facilidade de uso, ele permite que você mantenha a posse exclusiva de suas informações, garantindo que apenas você tenha acesso aos seus arquivos. Ao adotar medidas adicionais de segurança e escolher cuidadosamente seu provedor de armazenamento em nuvem, você pode fortalecer ainda mais sua postura de segurança cibernética e proteger seus dados de maneira eficaz.
https://cryptomator.org/
https://github.com/cryptomator/cryptomator
-
@ 8cb60e21:5f2deaea
2024-08-18 20:46:51 -
@ 599f67f7:21fb3ea9
2024-10-14 19:36:50Inoiz pentsatu al duzu norbaiti satoshiak modu originalean oparitzea, Bitcoin mundura hurbiltzeko? LNbits zorro batekin NFC opari txartel bat erraz sor dezakezu. Honek LNURLw esteka bat NFC txartelean idatziz funtzionatzen du, eta jasotzaileak bere satoshiak erabili ditzake LNURL gaitutako zorro batekin.
Zer behar dut?
- LNbits zorroa
- Android telefono bat
- NTAG2* gaitasunak dituen NFC txartela, adibidez NTAG216.
💡 NTAG2 txartelek esteka bat* idazteko aukera ematen dute. Adibidez, enpresaren webgunerako URLa duen bisita-txartel gisa joka dezakete. NTAG424 txartelek ez dute memoria handiagoa bakarrik, baizik eta SUN parametro deitzen den zerbait ere badute, zerbitzariaren autentifikazioa ahalbidetzen duena, eta horrek segurtasun gehiago ematen die zure ordainketei. Azkenean txartel mota hau BoltCard bat bihur daiteke.
1. Hedapena aktibatu
Ireki zure LNbits zorroa. Tresna-barran, aktibatu
Withdraw Links
hedapena eta ondoren joan hedapenera.2. Erretiratzeko esteka sortu
Withdraw Links
hedapen orrian, aukeratuAdvanced Withdraw Link(s)
aukera.Ondoren, aukeratu satoshiak ateratzeko erabiliko duzun zorroa. Ziurrenik, hori zure LNbits zorro nagusitik bereizi nahi izango duzu. Horretarako, LNbits zorro berri bat sor dezakezu tresna-barratik,
+ Add a new wallet
aukera hautatuz. Behin zorro berria sortuta, sartu satoshi batzuk bertan.Eman izenburu bat erretiratzeko estekari.
Ezarri erreskatatu daitezkeen gutxieneko eta gehienezko zenbatekoak.
Ezarri esteka zenbat aldiz erabil daitekeen eta erretiratze saiakeren arteko denbora.
Aukeran, argazki pertsonalizatu bat gehi dezakezu
Use a custom voucher design
laukitxoa markatuz, eta .png irudi baten URL-a sartuz.Gogoan izan “assmilking” laukitxoa ez markatzea.
Konfigurazioa amaitu ondoren, jarraitu erretiratzeko esteka sortzera.
3. Idatzi esteka NFC txartelean
Zure erretiratzeko esteka berrian, klikatu
View LNURL
estekan. Ondoren, sakatuWrite to NFC
botoia eta eutsi NFC txartela telefonoaren aurrean idazketa-prozesua burutzeko.✔️ EGINDA
💡 Esan txartelaren jasotzaileari satoshi saldoari buruz, denbora ez dezan galdu azkeneko satoshia lortzen saiatzeko.
💡 Jasotzaileak txartelaren satoshiak atera ondoren, bere zorroan berridatzi dezake eta berrerabili. Gainera, eman diozun txartela NTAG424 bada, aurreko gidako (nostr:naddr1qqxnzd3e8qcr2wfn8qcrgwf4qyg8wumn8ghj7mn0wd68ytnhd9hx2q3qtx0k0a7lw62vvqax6p3ku90tccgdka7ul4radews2wrdsg0m865sxpqqqp65whwqrr5) bezala Lightning "zor txartela" bihur dezake. Baina txartela NTAG2* bakarrik bada, beste opari txartel bat bihur dezake soilik.
-
@ 126a29e8:d1341981
2024-05-22 06:47:20Esta es la traducción de una carta de Ross Ulbricht que se publicó en su blog en Septiembre de 2019. Podéis leer el artículo original aquí: https://rossulbricht.medium.com/bitcoin-equals-freedom-6c33986b4852
Algo especial sucedió en el primer año después de que Satoshi nos regalara Bitcoin. Algo que nadie esperaba y que muchos pensaban que era imposible. Intenta imaginar Bitcoin en aquel entonces, antes de que pudieras comprar cosas con él, antes de que hubiera un tipo de cambio, antes de que nadie supiera realmente qué pasaría con él, si es que pasaba algo. Bitcoin no empezó como dinero. Se convirtió en dinero, pero lo hizo de forma distinta a cualquier dinero anterior. A pesar de todas las cosas que Bitcoin ha hecho posibles, a pesar de todas las formas en que está cambiando nuestro mundo, no apreciamos plenamente o ni siquiera entendemos lo que sucedió en aquellos primeros días, cuando era sólo un juguete para geeks.
Cualquier otro dinero anterior al Bitcoin -en la larga historia de la civilización humana- se valoraba por razones distintas a su uso como dinero. El ganado en África, los sellos de correos en las prisiones, las conchas marinas y los metales preciosos se han utilizado como dinero y encajan en este patrón. La única excepción es el dinero fiduciario -algo declarado como dinero por una autoridad-, pero incluso las monedas fiduciarias nacionales estuvieron en su día respaldadas por algo con valor previo, como el oro.
Bitcoin cambió todo eso. Bitcoin no tenía ningún valor previo y nadie estaba obligado a utilizarlo, pero de alguna manera se convirtió en un medio de intercambio. Las personas que no entienden y se preocupan poco por Bitcoin pueden, sin embargo, aceptarlo como pago porque saben que puede ser utilizado para pagar por otra cosa o ser intercambiado por dinero convencional.
La gente suele mencionar las pizzas que se compraron por diez mil bitcoins y, en retrospectiva, se burlan del tipo que se comió lo que se convertiría en un almuerzo multimillonario. A mí me interesa más la persona que renunció a dos pizzas en perfecto estado por meros bitcoins. ¿Qué vio en esos bits y bytes, en esa firma digital de algo que la gente llamaba cadena de bloques? Lo que motivó al vendedor de pizzas pudo haber llamado también la atención de los primeros mineros, que no podían vender pero acumulaban alegremente. Quizá inspiró a los que simplemente regalaban bitcoins por miles. Fuera lo que fuese, era algo nuevo.
La teoría económica clásica dice que un intercambio no se produce a menos que ambas partes valoren más lo que reciben que lo que entregan. Entonces, ¿de dónde viene el valor? Bitcoin nunca debería haber despegado, pero lo hizo. Incluso un producto nuevo tiene algún tipo de valor, y los primeros en adoptarlo corren el riesgo de no obtener el valor de su dinero, pero aún así esperan ganar con el intercambio.
En cambio, los primeros usuarios de Bitcoin no tenían ni idea de lo que sabemos ahora. Todo lo que tenían era un sueño, una convicción y el entusiasmo suficiente para convertir un artilugio digital en un fenómeno multimillonario del que sólo estamos empezando a ver los efectos.
Te diré lo que creo que pasó, aunque lo cierto es que nadie lo sabe. Es casi magia que Bitcoin pudiera surgir de la nada y, sin valor previo ni decreto de autoridad, convertirse en dinero. Pero Bitcoin no se originó en el vacío. Fue la solución a un problema con el que los criptógrafos llevaban lidiando muchos años: Cómo crear dinero digital sin autoridad central que no pudiera falsificarse y en el que se pudiera confiar.
Este problema persistió durante tanto tiempo que algunos dejaron la solución a otros y soñaron en cambio con cómo sería nuestro futuro si el dinero digital descentralizado llegara a existir de alguna manera. Soñaban con un futuro en el que el poder económico del mundo estuviera al alcance de todos, en el que el valor pudiera transferirse a cualquier lugar con sólo pulsar una tecla. Soñaban con que la prosperidad y libertad dependieran únicamente de las matemáticas de una encriptación robusta.
Bitcoin nacía pues en terreno fértil y era reconocido por quienes lo habían estado esperando. Fue un momento histórico para ellos, mucho más importante que las pizzas o las facturas de la electricidad generadas por la minería. La promesa de libertad y el encanto del destino dieron energía a la comunidad inicial. Bitcoin se adoptó consciente y espontáneamente como dinero mientras nadie lo veía, y nuestro mundo nunca volverá a ser el mismo.
https://freeross.org
-
@ 45bda953:bc1e518e
2024-10-14 16:47:18Kaspa Empire - Ceb System - Planet Hithe III
The day was hot and the manor sounded eerily quiet compared to the hustle and commotion of the hours prior. On the estate and in the master bedroom specifically, a married pair had become parents. “He looks so much like you Domitius.” Cleolia remarked while stroking the newborn's tiny arms. “He has strong blood.” The father responded smiling fondly sitting on the bedside. A silent nurse was tidying up the apparel and instruments of labour while the couple waited patiently for her exit to have more private discourse. “I am so glad to have born you an heir my love.” Domitius stared intently at his offspring. He had no qualms neglecting obligations to his property and recessed momentarily to celebrate the occasion with his wife. “I will send for the priest, register the child as an Imperial citizen and have him scribed into our family archives, but in the meantime, you must recover. Let a servant girl take our son for a while.” She pouted a playful but exhausted look of non compliance. “You must rest.” He insisted. “How can I let him go when I only just met him? Who are you little man?” She smiled faintly and nodded. “You are right, Domitius, where are you going?” “To the fields, the slaves are behind schedule, our harvest is big and taxes are high. This war is taking it's toll, we must excel to adequately serve the Empire in these pressing times. If the tamed Osteri could only comprehend what is at stake.” Cleolia peered cautiously at the embellishment and carvings on the wooden door knowing that Sethari was standing just beyond. Domitius trailed her gaze. “Don't worry my love, he means well, at least he tries to understand the urgency of my affairs.” He stood up straitening his vest and prepared to leave the room. “Domitius, wait...” He stopped at the door. “What will you tell the priest?” Domitius paused. “I will tell him Albin... Albin Domitius Chevalier.”
He left the room and it was quiet, the help entered and swaddled the baby rocking him while Cleolia drifted between sleep and conciousness. “Albin.” She repeated to herself as deep slumber enveloped her.
Domitius and his overseer walked briskly out of the manor towards the grain fields squinting as blue Ceb light reflected off the lanscape. “I honour you on the spawn of your son my lord, I hope for a good strong boy, you will be a happy father. I am happy with Seth.” He pounded his chest softly and proudly. “Thank you Sethari, is your son walking yet?” Domitius queried. “No my lord, still crawling on his belly like a beast.” The headman was trying to make his master laugh though Domitius was in a sterner mood having a weight on conscience. “I am in no mood to jest Sethari.” Domitius suddenly clenched his fists. “Get those slaves to work, I cannot have them idling when they should be harvesting.” Sethari made a small bow to his master and started yelling at his Osteri kinsmen, threatening them with a rolled up whip he procured from somewhere inside his tunic, waving it about and cracking it in the air every so often. Domitius picked up a scythe and proceeded to cleave down large swathes of grain. This had a more compelling effect of rallying the straggling workers to action than did the whip. They all toiled together in the pale light of Ceb.
Domitius was sweating, sweating and praying for a swift victory over the Jeula Federation. Fighting his small part in a increasingly complicated war, loyal to his Empire in his own unique way even though the conflict was far from home. A powerful loyalty that cannot be bought with riches or broken by coercion. A loyalty born through inheritance and blood.
...
The priest was in a more jovial mood than usual. The break of routine was a welcome one. The birth was indeed a momentous occasion. Few things seem of much report in a small planetary expansion program. He did not even seem to mind carrying a keg full of honey mead over the rolling hills of the plantation colony. “Domitius comes to church submissions far to infrequently.” The portly man mumbled to himself while wiping the accumulated sweat from his brow. “I eat too well among all these farmers.” The habit of speaking to himself was ordinary for this man of the cloth who always felt socially disconnected from his flock, caring for their souls, protecting their dignity and general well being like a responsible patron. “I feed their spirits, they feed my body, Hahaha. Tonight I will share my good spirits! Hahahaha.” Impressed by his own sense of humour he turned to witness the majestic blue star set over the skyline. Everything turned a silvery gray hue, and then the stars broke through the atmosphere lighting his way. “Clear skies, the blessed stars guide me.” He continued on the path approaching the Domitian manor and rapped a quick knock on the side of the root cellar doors. It creaked open upwards and a tall muscular Osteri took his baggage and let him in. “Thank you Setharis, my arms are weary, ready to fall off, bless you.” Domitius looked up from his bench seat below a glowing lantern. “Good to see you Father Ecknard.” “Dispense with the formalities and bring the dispenser.” He motioned to Setharis who placed the heavy keg on a table next to an assortment of documents, quill and sealed inkpot. “You pour Setharis and I will write. Name?” Ecknard scratches his chin with the quill contemplating his seat and it’s adequacy for the prolonged exercise of scribble. “Name?” Domitius paused. “Albin Domitius Chevalier.” The priest focused, started with his calligraphic art and fashioned the name and ASN standard block height beautifully onto the family records all the while biting his tongue. “He will inherit the colonial estates, all your assets in Kaspa Prime and the parochial offices at Magar Prime. Correct?” “Yes.” Replied Domitius solemnly. “I'll soon have to amend your will and testament. I'd have to make a registry at the parish and send correspondence to Magar Prime. There would be many from the royal courts who'll send their best regards from afar when this news becomes public.” Domitius did not seem as enthusiastic as Ecknard would have liked. “What ails you Domitius?” The priest could not help but make the pun and restrained a grunted laugh inside himself.
“I wonder if we should wait before registering and announcing him to Empire.” Ecknard’s expression slowly changed to puzzlement sitting up straight, his belly pushing on the heavy table. “In the voids name why?” “I am concerned... about this war...” “It is on the other side of Magar space!” The priest interjected in astonished retort. “I know father, maybe I am just being overly cautious, but with the Magar Dominus fleet occupied at the divide I am worried about the colonies in the isolated regions.” “Surely Kaspa prime will spare no expense to our defence in the improbable event of an invasion.” “The core keepers will not allow foul play from the Jeul.” “Yes Ecknard, but the fleet is not capable because most of our ships are at the aforementioned objective!” “No, no, no. Suggesting that conflict would happen outside of the divide is practically blasphemy. I cannot imagine insubordination to the Core mandates and the Accords." Domitius remained silently astute and father Ecknard decided to not argue further with the lord. His shoulders sagged. “I will not register the boy in the Imperial records.” “Thank you father.” “What do you know that I fail to see Domitius.” The two men stared at each other from across the table. The hulking bodyguard ever present in body but semi ignorant in mind silently and intriguingly observing the discussion.
“The value of sat. It is not calculated well by the common people, no offence father.” The priest piously lifted his hand and with tilted brow motioned. “None taken.” “My son and our blood line is invested with empiric power, if opportunists become aware of his existence and being outside the Magar prime void, we might have problems here on Hithe III.” Cumbersome thoughts and machinations of the mind darkened the mood of the party. Not at all what Father Ecknard was projecting in his minds eye during his arduous walk to what he was hoping, a celebration and getting drunk with an old friend. “The war does not seem to be ending any time soon, how long shall we stall his registration?” The priest reasoned on. “Think of the rites he will not be allowed to partake in at the church. He will be like Osteri.” Ecknard gestured towards Sethari. “This is a small colony Ecknard. My son will be educated as a member of royalty, all on Hithe III will acknowledge his social standing, I am only concerned that the secret be kept from the outside worlds. He will never be considered Osteri, he will know who he is and what his position is in the greater void. When the war is over we will properly introduce him to the families, currently they would be too occupied with politic as it is, and might not offer him due ceremony as they would under more peaceable circumstances.” The priest capitulated and grabbed a mug. “Your secret is safe with me Domitius, the lack of technology on this forsaken planet is good for your purposes, seeing as the only comms service on the planet is in the church tower. That blinking comms station hounds me daily with requests for your return to Magar Prime. The high counsel want to rebalance and need your signature.” Domitius sighed and looked away as if some spectre loomed in front of him.
I swear silence on the birth my lord, though let me make a final amendment to your proposal. A bit of extra security shall I say.” Domitius filled a cup of mead for Sethari and himself, becoming more relaxed and hospitable. “I am listening.” “If the risks are as great as you assume, let us pretend for the child's sake that he is Kaspian royalty only, and not true Magar. We then continue his education to the full and not put him in a position where he could compromise himself should he be... void forbid, captured by some opportunistic prospector.” Domitius looked ponderously into his cup. “Ecknard, my son is an infant... If we have to keep the boy in the dark about the true nature of his identity, how long do you predict this war to continue?” Father Ecknard leaned forward... “I sit at the comms desk every night and listen to the chatter. This war... is going to be a long one.”
...
scifi
-
@ 8cb60e21:5f2deaea
2024-08-18 19:04:49 -
@ 76c3384a:9279a6e5
2024-10-17 19:38:33-
"I want to learn to read and write mommy."
I designed this workbook for my eldest when she was 5 years old. She came to me one day asking me, "Mommy, I want to learn to read and write."
The first book I designed (the one she used) was done by hand with pencil and paper. I wanted to digitize the worksheets for my other children to print and reuse, but at the time I had no experience with digital design. Since I was a Linux user I used Libre Office and Inkscape. Learning on the go eventually publishing 4 workbooks and 1 basic reader all crafted with open source software. At first workbooks were only available in Afrikaans, but I had many requests to also publish them in English and now all of my material is available in English and Afrikaans.
-
Since 2024 my digital books are available for free (no strings attached) for anyone to use, they have also been updated and revamped to be Bitcoin-friendly. All I ask is that you refer to my website or Nostr account when sharing.
I am not a teacher and have no degree or diploma in education. Just a mom that had difficulty finding classical education workbooks to help my daughter learn to read and write. I took it upon myself to design something that worked for us.
I hope you find this helpful. Enjoy, and follow me on Nostr.
About this workbook
An educational exercise book teaching children to read and write during the foundation phase. “Look mommy, I can read and write” is for home and classroom use. It can be used as an extra aid for Grade R or Grade 1 curriculum or as a revision book.
Each exercise was drafted by hand and then digitized. The letters had to be as similar to hand written symbols as possible. It was well researched. Due to the fact that all is in black and white, the children can be more creative by using colour pencils and crayons.
The first letter is the letter “a”, then follows the letter “d”. By doing just the first two letter exercises the child will already be able to sound (read) the word “dad”. Each letter consists of three exercises.
-
There are many pictures to colour, sentence and word building exercises.
This book is particularly ideal for parents who want to play an active role in this phase of their child’s development and education. It will also give satisfaction to the parent that wants to teach his/her own child to read and write by working together in the book.
It is a great homework aid for teachers to send home for extra repetition.
(The character style and writing symbols may differ depending on the country you live in.)
DOWNLOAD PDF HERE!
-
-
Written, designed and cover by SemcoMama
semcomama.co.za / semcomama.npub.pro
© All rights reserved. Feel free to share with all mommies out there and you can also follow me on Nostr @semcomama. If you appreciate my work and found value in it zap me some sats. (through my website or my Nostr account).
education
-
@ 99fdaa11:3157ec8e
2024-08-17 04:41:50Wow
-
@ 3c827db6:66418fc3
2024-05-20 12:25:27With the previous articles, we found the disconnect between paid-for work and paid-for time. We also understood that if you want to get paid you have to provide work that is valuable for others. So when the person consumes the benefit of your work, the exchange happens value for value - work for sats. But what happens if the benefit that the consumer experiences is not a momentary but a continuous process? There are a few examples of this. I will start with the one that is not that captivating but still valuable.
Streaming services, like other industries, grapple with the limitations of the fiat payment system. The burden of fees and the absence of suitable technology for streaming payments have compelled them to adopt similar mitigations as other industries. This translates to charging users on a monthly basis.
With the Lightning Network, we have the technology to stream sats for content. No longer confined to monthly subscriptions, you pay for what you consume in real time. Whether you watch sporadically or binge extensively, streaming payments allow for a more personalized and efficient payment model. This way the creator of the content and the user have a direct connection for each minute the content is broadcasted. With streaming payments now you can say goodbye to subscription payments.
Unveiling A New Era Of Fair Compensation And Accountability In Movie Production
Imagine you've created a movie or documentary. Traditionally, you'd charge people for a ticket, essentially asking them to pay upfront for future value, creating a slight disconnect. Now, with streaming payments using sats, consumers can pay as they watch. If your movie sucks, they might only pay for the first 30 minutes. However, you still receive value, and viewers won't feel overcharged for something they didn't enjoy. If your movie is great they not only stream sats the whole time but at the end, they leave a tip.
On the receiving side of the movie most people involved in it received a salary for doing their job. As we already know this is not aligning the whole structure in the same direction. Some people do not care at all how good the movie is if they have already been paid and do not receive a bonus further. Some people might care about reputation in the market but very few just want to do the best job. Again, we went through this, and as you are guessing you just do a split payment in the backend where all the people in the credits actually receive sats or even milisatoshis based on their contribution. This was something I did not expect that Bitcoin would disrupt. This way the reputation is directly linked to the payment and a lot more people will fight to have the best movie. You can be someone who contributed to a project and wants to stay anonymous for whatever reason but still receive money - Lightning instant settlement is the way to do it.
These concepts should not be new if you read through the last 3 articles. In addition, people in the Bitcoin space are familiar with the Value for Value (V4V) podcasting and that is very close to what I am describing above. While the technology for podcasting is already in place, it's surprising how few podcasts leverage this technology to implement split payments effectively. They give that responsibility to some hosting service that decides to take a 5% split for themselves and the other 95% goes to the wallet of the show. Why not do the split the proper way? The hosting service provides value so they should get a percentage but if you are 3 people involved in the production of the podcast you should have that 95% split so it goes to those individuals. There's no excuse, especially for Bitcoin podcasts, not to make this effort and implement split payments appropriately.
The Dynamic Future Of Pay-as-you-go In Content Consumption
In this example, the pay-as-you-go model holds true for continuous experiences, like streaming. Now, let's revisit the movie example. If you're a theater, you are essentially the hosting provider for the movie. The quality of the theater experience can vary; one theater might have uncomfortable chairs, while another boasts luxurious massage chairs. The theater with subpar seating might receive a 3% share of the movie's streaming sats revenue, while the one with comfortable massage chairs might earn 5% for each sat stream paying for the movie. Furthermore, if a viewer activates the massage function of the chair, additional sats are streamed for each second that the function is on. I do not know the exact payment dynamics between theaters and movie studios but I bet there are prepayments and funds held at multiple points in the fiat payment process. With the adoption of the Lightning Network, theaters no longer have to prepay for movies to be projected on their screens. They can now observe which movies are most popular in real time and adjust their projections accordingly to optimize revenues. This benefits the consumer and optimizes profits for themselves and the creators of the movie.
Now you see the content gets its value stream for the continuous experience and everyone in the film industry will fight to give the best experience for the most amount of time. The better the experience the more sats flow their way. Due to the highly subjective nature of content, where one person might deem a movie subpar, another might label it as their favorite. This subjectivity is why I believe most content streaming will not have a predetermined price. Even movies may adopt the V4V model, similar to what Adam Curry is pioneering in podcasting. For instance, you watch a movie, and during the credits, a prominent QR code appears, allowing you to decide how much you want to send to the creators of the movie. You will listen to a song or a podcast the same way. Whether you predefine a streaming rate per minute or request payment at the end, both options are technically possible. However, the market will ultimately determine which option prevails as the better one.
Also, why not have a bidding competition for any event that has assigned seats? The person who bids the most for a ticket gets to be in the first row of the concert or a sports stadium. This way the subjectivity is left for all the viewers to decide how valuable it really is. This way it ensures a full stadium also because if there is no value in attending the event people are not going to bid for the seats or just pay 1 sat for it.
Revolutionizing Taxi Transactions For Drivers And Passengers Alike
The continuous experience or service for streaming could be anything in the physical realm. I will take a look at how instant settlement could look like in transportation services. One such transportation service is the taxi service. Even though Uber decentralized the taxi companies which is great they did nothing about decentralizing the payment process. Lightning Network fixes that and more.
With a streaming payment option for each meter of movement, taxi drivers no longer need to wait until the end destination to receive their payment. In a world of instant settlement, payment occurs as you go, eliminating the risk for the taxi driver regarding whether the passenger will pay at the end of the journey. While this might not be a groundbreaking improvement, there are several additional benefits to consider.
Why do most taxis operate with cash? Taxi drivers in most places need a POS device for the customers to be able to pay for a better user experience (UX). It may be a better UX but on the other hand, it creates problems for the drivers either way:
- They have to acquire clunky devices.
- They must pay payment processing fees, negatively impacting their margins.
- Operating solely with cash exposes them to the honeypot problem, carrying a substantial amount of money, and making them vulnerable to theft.
With an app tailored for the taxi experience and integrated with the Lightning Network, these issues become irrelevant. There is no need for additional equipment, no payment processing fees for receiving money, and no exposure to visible cash, reducing the risk of being a target for theft. Now you can have a better UX with better security and better margins - an additional benefit is that it will be paid with Bitcoin. Not only that but just like the example with the movie theater chairs drivers will be incentivized to make the travel experience even better. They can offer - to watch a movie, video games like PlayStation, or massage chair. If you choose to use those extra experiences on top of the travel experience you have to increase the sats streaming their way.
An additional benefit for the travel experience of customers arises when multiple passengers in a taxi have different destinations. Traditionally, the taxi meter ticks for the entire journey, and when the first person is dropped off, determining a fair amount for their portion becomes complex. However, with the Lightning Network, it's conceivable to streamline this process. Imagine a scenario where three passengers enter a taxi, each with distinct destinations. Each person scans a QR code upon entering, linking their streaming sats to the taxi app. The app manages split-receiving, dynamically adjusting the distribution of streaming payments based on how many people are in the taxi. As passengers are dropped off one by one, the app seamlessly adjusts the split-receiving, providing a fair and efficient payment solution for each individual's share of the journey.
Optimizing City Transportation With Streaming Sats
The proposed model of split-receiving through QR codes and streaming sats can extend beyond taxi services to other modes of transportation, such as buses. The idea is to calculate the average cost per mile (or meter/foot) for providing the transportation service, including factors like fuel, maintenance, and driver salary, and add a margin for profit. Passengers entering the vehicle scan a QR code, and the app dynamically adjusts the streaming payments based on the number of people on board.
For buses, this model allows for real-time adjustment of streaming payments as passengers enter and exit. If there are 30 people on the bus the split is between them. At the next stop, 10 people are dropped off and 5 people get on board - now the sats stream is divided by 25 people. As the number of people on the bus changes at each stop, the streaming sats are proportionally divided among the passengers. This approach can lead to more efficient and flexible city transportation. Late-night buses will be more expensive for the passengers because of the fewer riders, while buses during peak hours may offer a more cost-effective traveling experience as payments are shared among more passengers.
This system encourages transportation optimization around events, such as concerts or sports games, where private buses or minivans wait to fill up before departing. Routes can be dynamically adjusted because you will have a system tracking how many people are in the vehicles at what time and at what location on the map. Importantly, this data remains anonymous, as no KYC information is required for the Lightning Network payments.
The Streamlined Pay-from-a-distance
Now with this streaming money feature, it can be applied differently. Let’s go back to the taxi service for a moment. The pay-from-a-distance feature that is available in the Lightning Network can significantly enhance the experience of ordering a taxi. Instead of the traditional model where drivers wait patiently and charge fixed fees when passengers enter the car, this model introduces streaming sats from the moment the passenger accepts the ride. Here's how it works:
- The passenger places an order in the app, specifying the destination. Nothing new here.
- Drivers see the order and can apply for it, similar to platforms like Uber.
- Streaming sats start the moment the passenger accepts the driver, and streaming payments commence. This fee will be less than the actual transportation but the user is still paying for the service of the car coming to him and not the other way around.
- The taxi arrives at the passenger's door, and the streaming payments continue. There is a fee for waiting at the door per minute.
By shifting the waiting cost to the passenger, there's a strong incentive for both parties to be prompt, and the system becomes more efficient. Additionally, the passenger's responsibility to follow the car reduces operational costs related to alerting passengers via message or a call. Any inefficient time management becomes a cost for the passenger. This model aligns incentives for both drivers and passengers, creating a more seamless cost and time-effective taxi experience.
The concept of paying from a distance can be creatively applied to various scenarios, providing convenience and peace of mind. For instance, when it comes to sending your child somewhere with a taxi, traditional concerns about trusting them with money or the driver's reliability may arise. However, with the ability to stream sats for the ride, you gain real-time visibility on your device, tracking your child's journey and ensuring they reach the intended destination safely. This pay-from-a-distance feature extends beyond transportation and can be applied to other continuous services. For example, daycare services charge per minute, allowing you to stream payments in real-time, ensuring accurate and fair compensation for the duration your child spends there. Additionally, you can send a present to a friend, such as a massage session, and pay for it in a streaming fashion, covering the cost continuously based on the duration of the service. The flexibility of streaming payments not only offers real-time tracking and control but also opens up new possibilities for various services where charging per minute or duration is relevant. Those services can be paid on the spot or from a distance. image2
I know that now it looks like we are going backwards from the original point of never paying money for time. The key distinction here is that you may be paying for time past for the service but in that time you get a continuous stream of value (work done) so you are streaming value back to pay for it. In some cases the time spent is actually an accurate measure of the work done.
It's true that developing apps with such functionalities is technically feasible, and there might be entrepreneurs and developers willing to explore these possibilities. However, a significant challenge arises when considering custodial control over users' funds. Small startups might find it financially burdensome and complex to operate as custodians, potentially steering away from such responsibilities. This will take not only high responsibility but also a very big financial wall and expertise to obtain the licenses that comply with the ever-changing regulations. On the other hand, large tech companies with substantial resources could afford to take on the role of custodians, presenting both a business opportunity for them and a risk for the users. The move by some tech giants, like X(formerly Twitter), to obtain such licenses can be seen as a strategic measure for self-preservation over their own finances. This is also an opportunity to consolidate control over not only user data but user finances within their platforms.
The Breez SDK offers a powerful solution, empowering developers to create diverse applications without having to worry about payment intricacies. Its non-custodial nature is a key advantage, eliminating the need for licenses. The infrastructure of it is made in such a way that it is peer-to-peer so no one is holding money for someone else. The app developers focus on the experience within the app and just plug in the code. This combination of features gives startups a competitive edge and reverses the advantage held by large tech companies. While they go through the complex process of getting a license the startup can integrate the global payment network (the Lightning Network) in one day. Even if certain tech giants choose to lock users' funds within their applications, alternative options will continue to be developed, and users will have the freedom to opt-out. Just like people are choosing Bitcoin over fiat.
Now who is ready to give all of us those experiences in their app?
-
@ df478568:2a951e67
2024-10-13 20:36:12Keet is a peer to peer video chat room that is available on: • App Store • Google Play • Linux • Mac • Windows
It uses technology similar to BitTorrent, but you make video calls instead of downloading music, free and open source software, and movies that are in the public domain. If you have ever used BitTorrent, I'm sure these are the things you have used Bittorrent for.😉 You can use Keet for:
• Video Chat • Voice Phone Calls • An Online Chat Room • Sending Files Between Devices
Since we are in the very early days, not too many people know about it, but I prefer this because the sound quality and speed are superior to most corporate alternatives. If you've ever tried sending a large file through the InterTubes, you'll know this can be a sucky experience. Even if you run your own cloud like NextCloud, it's an inefficient. You upload your large file to the Nextcloud instance which is basically another computer. Then you download the file to the compter you really want it on. In this case, your Nextcloud acts like a middle man. This man in the middle architecture used to transfer large files is inefficient.
**note: This was originally published on my Ghost blog. It may not work on all nostr clients.
Jeff Swann told me about this new technology a couple years ago. He told me how he used Keet lo transfer files. I heard what he said, but I didn't quite understand how powerful this was until I tried it myself. I can send videos from my phone to my desktop computer within second just by using Keet rooms. This is a computer networking super power. I just can’t reiterate how much time this has saved me. It is something you need to experience for yourself. By the way, anyone who can download an app and install a program on their computer can do this. You don’t need to be a network administrator wizard or learn how to code.
If you would like to join my keet room, check out my nostr page or LinkedIn and I'll send you a link.
Keet Vs. Legacy Video Calling
Legacy chat rooms and video calling services require a server. The data is hosted on their server. This is inefficient and requires a ton of centralized infrastructure to handle the bandwidth. This infrastructure requires a lot of maintenance, marketing and other stuff. They have thousands of employees working for them to get your videos from point A- to point C- to point B. I’m sure these people do a wonderful job, but Keet is different.
Keet allows you to go from point-A to point-B. According to their website it is: - Private & encrypted - Has amazing video quality • Allows you to instantly share huge files That huge file sharing is awesome by the way—Even if you don’t really talk to that many people on it very often.
It is made by a peer-to-peer company named Holepunch. They have not yet open sourced it yet, but they say they have plans to do this on Guy Swann’s podcast. They also made something called pear-runtime. You can learn more about this at pears.com. From what I understand, this is a new way to do computer networking. It basically makes it possible to host an app or website from your computer using one line of code. This allows you to create your own Intranet with the greatest of ease. I tried it one time using an application named HoleSail. I was able to access a website using a local IP address from a LAN outside of my home network. I didn't need to fiddle with the DNS or buy a domain name. I just installed the program on my computer, wrote one line of code, and copied the key to access the website.
Keet Is Brand New Technology.
I just want to mention this is on the bleeding cutting edge of technology. I am explaining this to the best of my ability, but it is beta software so what I say today may be totally different a year from now. It is also quite possible that I misunderstood some stuff and if that is the case then I apologize in advance. I find this technology interesting and think it opens us up to a new ways of using the Internet, but I don’t have a crystal ball. Do not confuse this as investment advice, but as far as I know, this is not even something you can invest in. You don’t even need to buy Keet. You just download it.
I don’t know much about the big corporate video calling companies, but I’m pretty sure they charge a fee for some of their services. Please don’t take my word for this, I have no idea how they work or what their fee structures are.
Here are the sources where I have learned about these things: Hat tip to Jeff Swan who taught me how Keet worked and to his brother Guy Swann for making all these great podcasts about it. • Interview with SuperSu • The Pear Report Episode: 2 • Bitcoin Audible: Keet AMA - Twitter Spaces on January 30th • [The Pear Report: Updates From The Pear World]((https://fountain.fm/episode/blklbIi1GZCgIvX9E8nY)
✌️
https://tinyurl.com/marc26z
865,210
As Seen On TOR:
http://p66dxywd2xpyyrdfxwilqcxmchmfw2ixmn2vm74q3atf22du7qmkihyd.onion/pear-to-pear/
On The Clearnet:
https://marc26z.com/pear-tp-pear/
-
@ e968e50b:db2a803a
2024-10-17 17:27:37Hey everybody!
There is now a webLN version of my Piggysats Wallet. Just head over to this link and sign in with your Alby wallet or other web extension wallet. The goal of these piggy bank fronts are to create savings tools for kiddos that are also fun and appealing to their cute little brains. This one should have the lowest barrier to entry to date![^1]
It only grabs the transactions of certain types of wallets right now. I'm troubleshooting that, but in the meantime, it should be a safe way to look at your balance and make invoices. You'll need to manually put in your LNURL if you want to use the "Life Skills" textbook for a QRCode of your LNURL.
https://piggysats-webln.vercel.app
You can also:
- use an LNBITS instance: https://bitcoin-piggy-bank.vercel.app
- or host your own LNBITS version, which is a little more complicated: https://github.com/ttooccooll/Bitcoin-Piggy-Bank
[^1]: especially for stacker news parents staring down the barrel of Nov 5th!
originally posted at https://stacker.news/items/728405
-
@ fa984bd7:58018f52
2024-08-16 13:22:12 -
@ ebdee929:513adbad
2024-10-17 17:09:57Software Setup Links:
DC-1 as a monitor:
- SuperDisplay Setup | Best for Windows
- SpaceDesk Wireless and Wired Display Setup | Windows PC Users
- Chrome Remote Desktop Setup | Anyone
Purchase and setup links:
Keyboards:
- Keys-To-Go 2 White Keyboard | Logitech
- Keys-To-Go 2 Bluetooth Setup
- Magic Keyboard White | Apple through Amazon.com
- Magic Keyboard Bluetooth Setup
- Air 60 V2 with Blue Switches | Nuphy
- Air 60 V2 Keyboard Folio | Nuphy
- Air 60 V2 Bluetooth and Folio Setup
- Magic Keyboard Case | Fintie through Amazon.com
Pens:
- Premium White Pen
- Ultra Premium Lamy Pen | Amazon.com
- Samsung S Pens (Multiple):
- Small (Galaxy Note Series Style)
- Cheaper Alternative (ZERO Quality Guarantees)
- Medium (Galaxy Fold Style with smooth tip)
- Cheaper Alternative (ZERO Quality Guarantees)
- Larger (Galaxy Tab Style)
- Cheaper Alternative (ZERO Quality Guarantees)
Pen Setup: Just touch the screen and it works, no pairing or charging needed.
Others:
- Bluelight Free Light Bulb | Amazon.com
- Light Bulb Setup
- Comfy Green Sleeve | Amazon.com
Keys-To-Go 2 Bluetooth Setup:
- Step 1: Unbox keyboard from box
- Step 2: Open keyboard and pull tab to enable batteries and keyboard function
- Step 3: Ensure Switch on back of product is in the position where green is showing, not off where red is showing
- Step 4: Hold the key labeled ‘fn’ meanwhile you hold the ‘g’ key for 3 seconds to put the keyboard into android mode, since this is an android tablet
- Step 5: Hold the key labeled ‘fn’ meanwhile you hold the key labeled ‘F1 with the image of the laptop and phone for 3 seconds to put profile 1 into bluetooth pairing mode
- Step 6: On your Daylight DC-1, swipe down on the top of the screen, swipe down again, click on the settings icon that looks like a gear in the bottom right corner
- Step 7: In settings, click the second from the top menu item on the left called ‘Connected devices’ (it says Bluetooth, pairing underneath it)
- Step 8: Click on the button labeled ‘Pair new device’
- Step 9: Under available devices tap on Keys-To-Go 2
- Step 10: It will ask you to type some numbers and hit return/ enter, once you do so the device will show up as connected under ‘Saved Devices’
- Step 11: Turn off the keyboard with the switch on the back if you desire, this will disconnect it from the device
Appendix: Keys-To-Go 2 Documentation:
Apple Magic Keyboard Setup:
- Step 1: Unbox keyboard from box
- Step 2: Ensure Switch on back of product is in the position where green is showing
- Step 3: On your Daylight DC-1, swipe down on the top of the screen, swipe down again, click on the settings icon that looks like a gear in the bottom right corner
- Step 4: In settings, click the second from the top menu item on the left called ‘Connected devices’ (it says Bluetooth, pairing underneath it)
- Step 5: Click on the button labeled ‘Pair new device’
- Step 6: Under available devices tap on Magic Keyboard
- Step 7: It will ask you to type some numbers and hit return/ enter, once you do so the device will show up as connected under ‘Saved Devices’
- Step 8: Turn off the keyboard with the switch on the back if you desire, this will disconnect it from the device
Spacedesk Setup:
THIS IS ONLY FOR PEOPLE USING A WINDOWS PC
- Step 1: Open the Google Play Store: On your device, slide in from the side until and move till you get to the letter ‘P’ and tap ‘Play Store’
- Step 2: Search for SpaceDesk: In the Google Play Store, tap on the search bar at the top and type "SpaceDesk". As you type, suggestions will appear below the search bar. Tap on "SpaceDesk - USB Display for PC" when it appears.
- Step 3: Download and Install the Driver: Visit the
official Spacedesk website and download
the ‘Windows 10/11 (64-bit)’ Spacedesk driver for Windows. Follow the on-screen instructions to install it on your PC. - Step 4: Launch Spacedesk Server: After installation, open the Spacedesk Driver Console application on your Windows PC.
- Step 5: Click the ‘USB Cable Driver Android’ button, then enable the ‘USB Cable Android’ option and let it apply.
- Step 6: Open Spacedesk App: On your Android device, open the Spacedesk app you installed earlier. - Step 7: Improve Quality: Click on the ‘3 lines’ icon and then settings.
- Under ‘Rotation’ enable ‘Auto-Rotation’ and under ‘Quality/Performance’ slide ‘Image Quality’ to max (the right) and set ‘Custom FPS Rate’ to 60. - Step 7A (for wired use): Plug the tablet into your PC - Step 7B (for wired use): Enable USB File Transfer: Swipe down on status bar (the bar at the top of the screen with wifi and notification icons etc. There will be a notification under the ‘Silent’ category named ‘Charging this device via USB’, tap on it to expand it, then tap once more time when it says ‘Tap for more options’. This will open up a menu, all you need to do is click ‘File Transfer’ under the section called ‘Use USB for’ - Step 8: Connect: Reopen the Spacedesk app (use the back arrow or button to leave the settings menu should you need). The app should now detect your Windows PC through USB OR wireless. Tap the listing under your computer's name for wireless connection, or tap the little trident USB icon at the bottom middle of the screen for wired connection, which is recommended.
SuperDisplay Setup:
THIS IS ONLY FOR PEOPLE USING A WINDOWS PC
- Step 1: Open the Google Play Store on the tablet: On your device, slide in from the side until and move till you get to the letter ‘P’ and tap ‘Play Store’
- Step 2: Search for SuperDisplay: In the Google Play Store, tap on the search bar at the top and type "SuperDisplay". As you type, suggestions will appear below the search bar. Tap on "SuperDisplay - Virtual Monitor" when it appears.
- Step 3: Download and Install the Driver on your Windows PC: Visit the
official SuperDisplay website and download
the Windows driver. Follow the on-screen instructions to install it on your PC. - Step 4: Launch SuperDisplay : After installation, open the SuperDisplay Settings application on your Windows PC by hitting the ‘Windows’ Key and typing ‘SuperDisplay Settings’ - Step 5: Launch the application on your tablet. - Step 6: Go into SuperDisplay settings by clicking the settings gear icon in the top right corner. Under ‘Advanced settings’ click ‘Quality’ and slide it to 100. - Step 7 (Wireless): IP Address: Back out of the settings and input the IP address into the desktop program. (Both devices need to be on the same wifi) - Step 7 (Wired): Plug the tablet into the PC - Step 8: Start the connection on the tablet by clicking the central button! - Step 9: In Windows, hit the ‘Windows’ key, type display and hit enter. This will take you to display settings. In display settings set the displays to ‘extend’ and then confirm the change. Select the DC-1 display by clicking the square it is associated with, then set the display to 1584 x 1184 resolution, confirm this by hitting ‘keep changes’, then set to 125% scale.
Chrome Remote Desktop Setup:
Note: This prefers Chrome itself on the tablet and REQUIRES a chromium based browser to be installed on your computer, examples of chromium based browsers are Chrome, Edge, Arc, Opera etc. Basically anything but Safari or Firefox will do. This is because a chrome extension needs to be installed. Both devices need to be signed in to the same Google account to see each other.
- Step 1:
and click the download button here:
- Step 2: Get the extension in the window that pops up:
- Step 3: Once installed, click the download button AGAIN and it will show what is shown below, a program called ‘chromeremotedesktophost’ will download, install it.
- Step 4: In the play store, install the ‘Chrome Remote Desktop’ app and open it, the app's name will be just ‘remote desktop’ as a heads up. - Step 5: On the computer, go to
and click set up remote access under the ‘Remote Access’ tab. Then set a computer name and pin. Accept whatever permissions pop up on your computer
- Step 6: If you have Chrome itself installed on the tablet it will open a page, click the ‘Access my computer’ button, then under remote Access click your device.
APK Installation Guide:
- Note on APK’s: These are apps from outside official sources, they might not update from the play store and in rare cases can have different functionality. Apply extra caution and source these app files from good sources like
. Just like through the play store or other sources, malicious files can be spread, use common sense and generally avoid downloading any ‘hack’ apps that claim to unlock features. - Step 1: One the home screen, swipe down from the top of the screen, also called the status bar - Step 2: Swipe down again till the settings tiles fill the screen, then click the gear icon in the bottom right hand corner of the screen which will take you to the settings application - Step 3: In settings, tap ‘Apps’, then ‘Special app access’, then ‘Install unknown apps’ - Step 4: Tap your preferred browser application then enable the ‘Allow from this source’ toggle - Step 5: Open your browser of choice, and search ‘apkmirror’ and navigate to
, or just type
https://apkmirror.com/ - Step 6: On the apkmirror website, search your application name in the search bat at the top of the apkmirror website. After you search find your app in the results and tap the most recent version. Dismiss any ads you might see. - Step 7: Under the text ‘Verified safe to install (read more)’ tap the button called ‘SCROLL TO AVAILABLE DOWNLOADS’ - Step 8: Find a file tagged ‘APK’ not ‘BUNDLE’ - Step 9: Click on the Download Arrow and line icon that looks like this ⬇️ - Step 10: Under ‘Verified safe to install (read more)’ tap ‘DOWNLOAD APK’ - Step 11: If it appears, dismiss the warning for ‘File might be harmful’ by tapping ‘Download anyway’ - Step 12: After your apk downloads, either - Tap ‘Open’ on the ‘File Download’ Pop-Up - Go to the home screen and open the files app, navigate to the downloads folder and tap on the downloaded apk - Step 13: Tap ‘INSTALL’ on the popup that appears. After it installs tap ‘OPEN’ - Step 14: The app will now be on your device and you can search and open it like every other app
Touch grass,
Daylight Team
-
@ 8cb60e21:5f2deaea
2024-08-09 22:58:36 -
@ c80b5248:6b30d720
2024-10-13 18:14:34Using tools like Continue in your vault
As the capabilities of artificial intelligence continue to expand, integrating AI into our workflows has become an increasingly attractive option. One of the most exciting applications of AI is its potential to enhance the way we manage and organize information. Obsidian, a powerful knowledge management tool, provides a robust platform for building a personal knowledge base. By layering AI tools like Continue over your Obsidian vault, you can unlock new levels of efficiency, creativity, and insight. This article will start to explore how to effectively use AI tools within Obsidian to enhance your note-taking, information management, and productivity.
An Explosion of AI Tools
Over the past few years, I have tinkered with ChatGPT and other chat interfaces, but I only recently stumbled upon the rapidly growing space of AI tools for coding. In such a short time, some amazing tools have emerged, most notably:
- Aider: A command line interface tool to iteratively generate, edit, and refactor code.
- Cursor: A fork of Visual Studio Code (VS Code) with integrated AI functionality.
- Cline: A plug-in for command line and code editor built to work with Antropic's Claude 3.5.
- Continue: A customizable VS Code plug-in with chat and code editing abilities.
These tools are designed to assist developers in writing, debugging, and even generating code from natural language prompts. They are powered by large language models (LLMs) like GPT-4 and Llama 3, which are trained on vast amounts of text data and can produce human-like responses to a wide range of prompts.
In this article, I will focus on Continue, a VS Code plug-in that offers multiple ways to interact with AI. It features autocomplete powered by an LLM of your choice, as well as the ability to generate new code blocks directly in the editor. It can also incorporate context from external sources or the local codebase. Additionally, it includes a standard chat window for interacting with the LLM.
The new twist is that I won't be using Continue to write code, but rather to write notes in Obsidian. I will be using the chat window to generate notes, and the autocomplete feature to assist me in writing them. By leveraging the context feature, I can bring in information from my Obsidian vault, allowing me to create more complete, accurate, and better-organized notes. I can also use the vault as context to ask for summaries or retrieve information from my notes, even as the vault continues to grow.
It's worth mentioning that while I am focusing on Continue, there are likely other tools that can be used in a similar way or provide better features. One example is the text-generator plug-in for Obsidian. This plug-in allows you to generate text using an LLM of your choice, and it can be used to generate notes, summaries, or even entire documents. It can also generate code, but I was unable to get the plug-in working with my LLM provider. Using Continue is a bit of a hack, as it requires working through an IDE like VS Code, but it's a good way to get started with AI tools in Obsidian. I will assume that you already have an Obsidian vault set up. If you don't, you can ask your assistant to help you organize it once you have it up and running.
The system I am going to describe here relies on two primary components:
- Continue (installed in an IDE like VS Code)
- An LLM provider to power Continue
Let's start by talking about LLM Providers. If you already know how these work, feel free to skip to the next section.
LLM Providers
LLM providers are services that offer access to large language models (LLMs) like GPT-4 or Llama 3.1, typically via an API (application programming interface). These providers usually charge by the token, which is the number of words processed by the model. You can go directly to a provider like OpenAI or Anthropic, or you can use an aggregation site like OpenRouter that provides a single API to access multiple models. Each provider has its own data privacy policies, so it's important to review them carefully. For this reason, I have been using DeepInfra. They run their own models and offer a clear privacy policy - even better, they tend to have the lowest costs.
h/t nostr:npub17vhnjkt04m6thytr8dna67v2pa4tjk7uh3ut40eq9wy8d28u0kvq7qnhkq nostr:note1qfckzxm687peaddwjpmms92kj3v59wrrx0cs2fcxlkm6pm9lyu3squscxa
Another option is to use Ollama to run some of these models locally. However, the hardware requirements for achieving good results quickly are quite demanding. For example, the smaller chat model I use in my configuration, which has 72 billion parameters, requires a 48 GB GPU to run efficiently—something that is not within my budget. This is why I am using DeepInfra.
Note: If you are setting this up for the first time, consider adding a small amount (less than $5) to a provider like DeepInfra and testing it out before you invest time in setting up a local Ollama instance. I have also had some issues with shutting down Ollama on Windows, so your mileage may vary.
If you choose to use a provider like DeepInfra, you are ready to move to the next section. If you prefer to set up Ollama, you can refer to their documentation for installation instructions. I prefer to run it in Docker, which can be done in Linux by running
bash docker run -d -v ollama:/root/.ollama -p 11434:11434 --name ollama ollama/ollama
or if you want to have an interface like ChatGPT, you can even run Open WebUI in the same command with
bash docker run -d -p 3000:8080 --add-host=host.docker.internal:host-gateway -v open-webui:/app/backend/data --name open-webui --restart always ghcr.io/open-webui/open-webui:main
Once Ollama is running in docker you can start up the models you want to use by running the following in your terminal.
docker exec ollama ollama run model_name
See the Ollama model library to choose which models you want to run locally.
Getting Started with Continue
Continue is installed as a plug-in for VS Code or JetBrains. I personally use it with VS Code, so my instructions will be based on that. If you are using a JetBrains IDE, you should refer to the Continue documentation for installation instructions.
After installing the plug-in, continue will prompt you to set up your LLM provider. In my experience, once this initial GUI goes away, you can't get it back. Instead, you will do most of the configuration within the
config.json
file for Continue, which you can access by clicking in the lower right corner of the Chat box. In VS Code, if you ever can't find anything,F1
is your friend and will launch a searchable menu.Continue provides recommended settings from each provider, which you can find here. For my coding and writing, I chose the very new Qwen2.5 72B Instruct due to its high benchmark scores and relatively low costs. This model costs $0.35-0.40 USD per million tokens, compared to the best available on DeepInfra, the Llama3.1 405B Instruct, which costs $1.78 per million tokens. The results may be slightly worse, but I prefer cheaper and faster for my purposes. For autocomplete, I am using a faster and code-specific model, Qwen2.5-Coder-7B. I have not yet tried changing the autocomplete model for usage with Obsidian, but that is on my to-do list. Lastly, by the time you read this article, these models may be out of date. One nice thing about having a provider API is that you can easily switch and test different models to see how they work. Aider has one of many model leaderboards that will show you some benchmarks.
After working through the configuration, your
config.json
file will have a list of chat models and a tab for the autocomplete model. It will look something like this:```json "models": [ { "title": "DeepInfra Qwen2.5 72B Instruct", "provider": "deepinfra", "model": "Qwen/Qwen2.5-72B-Instruct", "apiKey": "your-api-key" }, { "title": "DeepInfra Llama3.1 405B Instruct", "provider": "deepinfra", "model": "meta-llama/Meta-Llama-3.1-405B-Instruct", "apiKey": "your-api-key" }, ],
"tabAutocompleteModel": { "title": "DeepInfra Qwen/Qwen2.5-Coder-7B", "provider": "deepinfra", "model": "Qwen/Qwen2.5-Coder-7B", "apiKey": "your-api-key" } ```
Trying it Out
The Chat UI
Once you have Continue configured, you can open your Obsidian Vault in VS Code. You will want to add a
.continueignore
file in your folder that lists.obsidian
and any other files or folders you want Continue to ignore for context purposes.Click the three dots in the bottom of the chat bar and check that your vault (@codebase) index is complete. You can now chat with the LLM and ask it questions using your vault as a reference.
@codebase what are some common themes from this vault?
Continue provides a docs page that lists some types of questions that an LLM will be able to help with. Naturally, I asked the LLM to put these in the context of an Obsidian Vault and here is what it told me:
```md
Useful Questions
- High-Level Questions About Your Notes:
- "What are the main themes in my notes on personal development?"
-
"How do I incorporate agile methodologies into my project management?"
-
Specific Information:
- "What are the key points in my notes about productivity hacks?"
-
"Can you find any references to neuropsychology in my notes on cognitive science?"
-
Generating Content:
- "Write a new note on the benefits of meditation, using the same structure as my other wellness notes."
-
"Draft a summary of my recent project retrospective, following the format of my previous summaries."
-
Contextual Questions About a Specific Folder:
- "What is the main purpose of the 'Research' folder?"
-
"How do we use the concept of 'flow' in the 'Psychology' folder?"
-
Relationships and Connections:
- "What are the connections between my notes on 'Time Management' and 'Goal Setting'?"
-
"How do my notes on 'Digital Marketing' relate to 'SEO'?"
-
Task and Project Management:
- "What are the next steps I should take based on my notes for the 'Personal Finance' project?"
-
"Can you list the tasks I need to complete for my 'Career Development' plan?"
-
Deep Dives and Analysis:
- "Can you provide a detailed explanation of the concept of 'reflective practice' found in my notes?"
-
"What insights can you derive from my notes on 'Project Management'?"
-
Insight and Reflection:
- "What have I learned from my notes on 'Mindfulness'?"
- "Can you help me reflect on my progress based on my notes for the 'Health and Wellness' topic?"
Not Useful Questions
- Literal Review of All Files:
- "Find everywhere where the term 'mindfulness' is mentioned in my entire vault."
-
"Review all my notes and find any spelling mistakes."
-
Comprehensive Tasks that Require Literal Access:
- "Add a new section to all notes that discuss 'productivity' and summarize the main points."
-
"Rewrite all my notes on 'Digital Marketing' to include the latest industry trends."
-
Refactoring and Detailed Edits:
- "Update all references to 'Scrum' to 'Kanban' in my 'Agile' folder."
- "Add a new parameter to the function
calculate_score
and update all usages in my 'Programming' notes."
Summary
- Useful Questions: Focus on high-level insights, specific information, generating new content, contextual questions about specific folders, and reflecting on your notes.
- Not Useful Questions: Require the LLM to see and edit every file, perform comprehensive reviews, or make detailed edits across multiple notes. ```
Text Generation
Continue also offers in-editor code generation with the hotkey
Ctrl+I
and an entered prompt. I have only tried a few things with this, but it was able to successfully review a set of meeting notes I had written and summarize all of the outstanding questions. I expect you could also use this to autogenerate backlinks on a note where a follow-up note might be helpful, or quickly generate templates to be used in Obsidian. I ended up editing this entire article by selecting sections and prompting the AI with the following: "You are a proficient writer. Please edit this text for style, typos, spelling, and grammar."Autocomplete
Continue will also attempt to autocomplete unless you turn it off in the bottom right bar in VS Code. While writing this article, the autocomplete feature was somewhat helpful even though it is not code. Further configuration may optimize this even more. Keep in mind that autocomplete triggers frequently and will burn through a lot of tokens, so you will want to keep an eye on your usage. With the cheaper models I am using, I have only spent 10 cents over the past four days of moderate usage at work and at home. A bulk of that cost is due to autocomplete, and I sometimes turn it off to keep costs down. You may be able to limit these costs effectively by configuring the number of input tokens that can be sent to the API, but I am not sure how that will impact the results.
## Conclusion - Brought to You by Qwen 72B
In conclusion, integrating AI tools like Continue into your Obsidian vault opens up a multitude of possibilities for enhancing your note-taking, information management, and productivity. By leveraging the chat window, text generation, and autocomplete features, you can create more comprehensive and accurate notes, generate summaries, and automate routine tasks. The integration of LLMs into your workflow not only streamlines your processes but also provides deeper insights and connections within your knowledge base. While there are initial setup steps and some considerations around cost and configuration, the benefits of AI-assisted note-taking in Obsidian are well worth the effort. As AI tools continue to evolve, the potential for further enhancements and optimizations is immense, making this an exciting and valuable addition to any knowledge management system.
-
@ 8cb60e21:5f2deaea
2024-08-09 17:45:54 -
@ 4f82bced:b8928630
2024-10-17 13:49:06We crossed into Botswana from Livingstone, Zambia. Did you know this border is the meeting point of four countries? Zimbabwe Zambia, Namibia, and Botswana. Thanks to the previous lodge that accepted bitcoin, we went on a safari at Chobe National Park, a highlight of our trip thus far. The opportunity to sit and stare at hundreds of animals. Elephants, giraffes, zebras, kudus, buffaloes, and the mighty lions! For all those HODLers (Hold On for Dear Life) out there, spend your 'sats' and experience them! We never imagined we'd be able to use bitcoin to see such magnificent creatures.
Our main motive in Botswana was to visit the local community, Ola Bitcoin. Josh, its founder is single-handedly pushing the small community forward. He's onboarded a butcher, an arcade shop, a web designer, an eco-lodge, and a very nice barbershop. Funny enough we ended up on a double date at this salon and paid in bitcoin! Our wives got pedicures while we got our hair cut. We tipped three of their staff members in bitcoin and even interviewed their owner. The owner was skeptical about the government's stance on bitcoin yet was open to accepting it from his clients. Why? He saw value in its limited supply. Only 21 million.
Gaborone, the capital of Botswana was developed and not what we had expected. We learned that they are the largest diamond producers in the world by value! Another surprising fact? They have more heads of cattle than they do people. With a population of 2.5M people, the cattle account for almost 2.8M! The meat in this country was by far the highest quality meat we've had (a contentious topic with the neighboring Nambia).
Our bitcoin meetup here was a fun one. With only a handful of people in attendance, we discussed many topics and went in-depth when needed. Something difficult to do with a large group as you need to ensure everyone is following along well. This community is a testament that one person is all it takes to bring change. We expect this one-man army will continue to chip away slowly, but surely, to increase adoption!
South Africa is up next.
-
@ 8cb60e21:5f2deaea
2024-08-09 17:28:40 -
@ b804f68e:2fb0fa1f
2024-05-20 06:07:22Consistently writing on SN and Obsidian has underscored for me the critical role of application in the learning process. Writing allows me to visually process, reflect, analyze, and organize the myriad ideas generated within my brain. Through this ongoing practice, I can physically sense my improvement in articulating thoughts to others and myself, both in writing and speech. However, both forms of expression still require significant practice, especially the latter.
Before I began writing regularly, I didn't fully appreciate the importance of purposeful learning. Previously, I viewed reading a book, watching an educational video, or listening to a podcast as the primary components of learning. But these activities are merely the initial stimuli that prepare our brains for deeper engagement, much like a warm-up before a workout. True learning extends beyond passive consumption; it involves actively practicing and applying what we've learned, reflecting on our experiences, and continually revisiting the material to fill in gaps and deepen our understanding. Sharing and discussing our insights with others further enriches this process, as it exposes us to diverse perspectives and feedback we might not have considered on our own. For me, writing acts as the bridge that connects acquired knowledge to practical application.
After writing on SN consistently for over a month, I've come to realize what it truly means to learn and acquire knowledge. Writing daily has exposed gaps in my understanding, often revealing that I lack the depth of knowledge I assumed I had. When I reach the limits of what I know, I'm compelled to research further, which reinforces and expands my comprehension.
Even if you never write publicly, I believe everyone can benefit from the act of writing. The more I write, the more intentional my learning process becomes, and the more organized and structured my thoughts are.